How to protect yourself from phishing: 10 tips
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
67 articles
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
So your hotel stay has come to an end and its time for checkout. When it comes to the Internet, there are two schools of thought when it comes to
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky Lab
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
Valentine’s Day is upon us and there is no sweeter gift to give to your significant other than the gift of security. If you’ve been following our posts then you’re
We have already talked about keyloggers – malware tools that intercept and record keyboard inputs. Every time you type your credentials to enter a social network, a payment system or
If you haven’t paid for an online transaction in bitcoins yet, chances are you probably will before long. The digital currency that was invented in 2008 has been widely adopted
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Kaspersky Lab’s Brian Donohue explains two-factor authentication Download podcast for offline listening
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals