
Tips on confronting a cyberbully
Confronting cyberbullies? Behave smart; don’t do what mockers expect from you. Check these tips to keep the situation under control.
661 articles
Confronting cyberbullies? Behave smart; don’t do what mockers expect from you. Check these tips to keep the situation under control.
What should you do if you use Kaspersky Lab products and you’re looking to upgrade your operating system to Windows 10?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Did you have a nice chat with your friends last time you met them? Or were you all only taking pictures of the meals for Instagram, and commenting each other on Facebook?
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of