How eSIM works
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
87 articles
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
When I fell victim to sleight of hand and a little bit of fraud, Find My iPhone didn’t save me. Here’s why.
In the 41st edition of the Kaspersky Lab podcast, we talk about Apple banning cryptomining, spyware hijacking webcams, spying through baby cameras, and more.
In the 40th edition of the Kaspersky Lab podcast, we look at Apple protecting privacy, Kim Dotcom, the World Cup, and more.
How scammers are exploiting the GDPR fuss to extract personal data.
Advertising in voice assistants is coming soon. We examine how it will use personal data and what you can do about it.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Olympic phishing, medical records hacked, police giving away infected USB drives and more.
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss a North Carolina county victimized by ransomware, Apple Face ID, and more.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
Apple’s macOS is considered more secure than Windows, and with good reason: malware for macOS is far less frequently found in the wild. Unfortunately, that lets many users believe they
People are more into texting than talking. About 65% percent of us would prefer to have a long and painful conversation via Whatsapp than to have one-minute phone call or face-to-face meeting.
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more than
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10 best quotes
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.