
How to make your VPN turn on when needed
Ensure Kaspersky Secure Connection switches on automatically when you open a particular app.
3281 articles
Ensure Kaspersky Secure Connection switches on automatically when you open a particular app.
How to safeguard your solution and clients with time-tested technologies.
Noushin Shabab on her cybersecurity career and how women can succeed in the field
On this week’s podcast, Jeff and David discuss Facebook fallout, Amazon’s “voice-sniffing” patent, and a paid version of Google.
How Kaspersky Endpoint Security for Business counters the latest threats.
What is a cryptocurrency wallet, and how do you choose which one suits you best?
What if you turn off Kaspersky Secure Connection but need it to automatically turn on again in dicey situations
A cloud instrument for detailed malware activity analysis.
Revealing the pros and cons of MSPs.
Holiday fraud: it’s not ‘just’ your money that’s at risk
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Jeff and Dave discuss the latest changes at Facebook, a data breach at Panera Bread, the fallout from the ransomware in Atlanta, and more.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Astrologers were fooling you all your life. Here is what real horoscope, based on science and machine learning, looks like.
A newly discovered ransomware, which takes coupons, cheques and even pennies as payment, is spreading fast.
The European Commission’s proposed ePrivacy Regulation takes effect in May 2018. Why is it a battle — and who is fighting for what?
Jeff and Dave discuss deleting Facebook accounts, Earth not being flat, new cryptocurrency, and more.
The day I turned home network defender and stopped making fun of IoT developers.
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain