Fortifying Facebook: Security Settings You Need to Know
In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
593 articles
In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
Frequently asked questions about Kaspersky Internet Security for Android are answered!
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
In the news this month: more transparency reports, Microsoft zero days, data breaches, and NSA revelations. WhatsApp – the popular global messaging service – is acquired by Facebook, much to
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you
Even though February is the shortest month of the year, we still have plenty of top stories to share with you, keeping you in the know when it comes to
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
The biggest annual event in the mobile industry, Mobile World Congress, started yesterday in sunny Barcelona. From the beginning, it has brought some amazing and unexpected news that will likely
The WhatsApp acquisition by Facebook made headlines yesterday because of the record sum paid by the social media giant for the messaging startup. That’s a whopping $19 billion for a
During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
A new version of Facebook for Android drew some media attention because of the SMS reading permissions it requires, raising users’ concerns regarding privacy. Developers do have a reasonable explanation,
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
Firefox mandates in its latest update that all Java plug-ins will operate on a click-to-play basis. Google removes a key privacy feature and fixes a serious vulnerability in its Android
It seems Santa’s reindeer could be deprived of their usual Christmas duty by 2016, as Amazon would arrange for your Christmas presents to be delivered via air drones. Moreover, the
A Hull, UK-based developer operating under the pseudonym DoctorBeet came to realize in early November that his LG Smart TV was actually gathering a quite a bit of information about
Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communications software or protocols). Therefore,
As the recent NSA leaks have revealed, our digital lives make it very difficult to maintain anonymity and protect our privacy — especially since we tend to make it especially
The newly released Android 4.4 features a tasty new codename (KitKat), some design improvements, revamped Contacts and Hangouts apps, and, of course, several security-related changes. So, how much more secure