An Interview With Vitaly Kamlyuk on Anti-Theft Software
Vitaly Kamlyuk of Kaspersky Lab explains the dangers of the vulnerable anti-theft software installed on ~2 million laptops. [youtube http://www.youtube.com/watch?v=Gq8-7EErqpM]
12 articles
Vitaly Kamlyuk of Kaspersky Lab explains the dangers of the vulnerable anti-theft software installed on ~2 million laptops. [youtube http://www.youtube.com/watch?v=Gq8-7EErqpM]
Full disclosure: we didn’t send anyone out to the Consumer Electronic Show (CES) in Las Vegas this year. If you aren’t familiar with it, CES is essentially a yearly showcase
Christmas and New Year’s Eve celebrations are quickly approaching, which means dinners with friends and relatives as well as parties and festivities. But, the holiday rush often makes us less
Expecting to attend a lot of parties and get-togethers before Chistmas? Check out our infographic to make sure you and your gadgets are well-prepared!
You have always had Kaspersky Anti-Virus installed on your computer and have been satisfied with the basic protection you’ve received against common threats. You have started to use Internet banking
It’s a weird time for mobile payments. Years ago it was thought that by now some parts of the world would be well on their way to if not fully
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
Protecting your home network is as daunting a task as you make it. If your home network consists of a wireless router and a laptop, then it’s pretty easy to
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Watch how Kaspersky Anti-Virus blocks threats and uses cloud-based technology to provide real-time protection. And, yes, it’s fully compatible with Windows 8.
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex