Rooting your Android: Advantages, disadvantages, and snags
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
86 articles
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Applications that offer to pay you for installing other applications tend to shove malware at you.
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
Everything you need to know about mobile banking Trojans and how to fight them.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Research shows that nearly 40% of people rate their smartphone at least as important as their close friends. And one man recently even married his phone.
Charging your smartphone’s battery over USB can be dangerous: Thieves can steal your files, infect your smartphone with something nasty — or even brick it.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
It’s not the best idea to use Safari on your phone with no ad blocker at all. You can remedy this omission with the help of our new iOS app Kaspersky AdCleaner!
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
Why you shouldn’t bring your smartphone to the bathroom
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?