Digital device searches at the border: 11 tips for safe travel
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
71 articles
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
Kaspersky Free Antivirus provides reliable and, yes, free protection for Windows machines
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Living online is more comfortable than ever — do you really still need a helmet?
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
How to choose an antivirus solution without falling for advertising tricks.
Many of us use several devices throughout the day, relying on a PC or a laptop for work, tablet for gaming and Web surfing, and, of course, a smartphone. If
Apple’s macOS is considered more secure than Windows, and with good reason: malware for macOS is far less frequently found in the wild. Unfortunately, that lets many users believe they
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how to
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it can be
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky Lab
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like crime
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
“Sensation!! Buy this super-effective anti-freckle treatment!” “The only way to battle nightmares for good!!” “Unique diet!! Just stop eating these 5 products…” – I won’t even dare to ask if
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent. For