Tips on confronting a cyberbully
The Internet can be used as a terrifyingly efficient medium for cyberbullying. It is also very easy to get stuck in an endless circle of hurt from these kinds of attacks.
21 articles
The Internet can be used as a terrifyingly efficient medium for cyberbullying. It is also very easy to get stuck in an endless circle of hurt from these kinds of attacks.
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
For a regular user like you and me it’s hard to imagine the whole path of online payment transactions and all obstacles that can appear on the way of one
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Online shopping is typically a money-saving move in and of itself, but there are tactics that you can use to keep even more cash in your pocket.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their vacations this time of year.
Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communications software or protocols). Therefore,
There is an all-too common misconception that in order to become infected with web-propagated malware, you must visit sketchy parts of the Internet’s underbelly or a website within that broad
When we enter the adult world, we tend to put a lot of care into building and cultivating our reputations. The way we present ourselves and the way others perceive
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone
In case you weren’t following us during May, here is a list of the most popular articles that were published on Kaspersky Daily last month. Beware of Snapchat The wildly
Twitter has recently caught up with competitors like Facebook and Google by improving user protection with two-factor authentication. This will help us all forget about those much talked about account
People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing your
While each country has its own legislation and borders, cybercriminals perform their activities worldwide. International cooperation is essential to successfully stop them. As a result, Interpol and Kaspersky Lab have