
Vulnerabilities in the iPhone
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
670 articles
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Reasons why you should pony up the money for your own Wi-Fi and stop stealing it from your neighbours.
Kaspersky Lab expert offers tips to avoid falling victim to ransomware.
Each day, Internet users around the world are under attack as new cyber threats are deployed by criminals. Unfortunately, many people still are not using antiviruses and firewalls at all
Spotify users’ account data once again found its way onto Pastebin. Change your password.
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
Check this out to know if you want to fall for one of the latest Facebook scams
A bug in Petya ransomware has led to a decryptor that can help those impacted.
Why do you need Kaspersky Protection browser extension?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
Over the years, the number of cyber-attacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
Today is the first annual Tin Foil Hat Day. What is it?
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
Manufacturers need to change their mindset when it comes to the IoT
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
While the popular notion is that Macs are virus-proof, it is actually quite a myth. These computers can catch viruses and Ransomware.
In this post we explain, what’s new in the latest update of the Private Browsing tool and how to use it.