
Security do’s and don’ts: Keeping weirdos aside
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
658 articles
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Did you have a nice chat with your friends last time you met them? Or were you all only taking pictures of the meals for Instagram, and commenting each other on Facebook?
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of
As a student, I had a little part time job of servicing and administrating computers for small businesses. Years have passed, but there are occasions when I have to remember
The new product of ours, Kaspersky Total Security, has just hit the shelves, and our customers have been bombarding us with questions ever since: “What are the key differences between
Do you get enough sleep at night? Honestly, I don’t and neither do a lot of my friends. Whether it’s down to today’s hectic lifestyle or something more serious such