VPN implementations and their peculiarities
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
515 articles
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
In this post we explain, what’s new in the latest update of the Private Browsing tool and how to use it.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
Kaspersky Lab’s research shows that some users are too eager to share everything they have when it comes to social networks
So your social media photos are public, great. Ever wonder what could happen when they get stolen?
Let’s find out how to enhance privacy and security of your VK account
VTech, a company that manufactures electronic learning devices, baby monitors, smart toys announced that information from 5 million customer accounts were accessed in an attack.
Facebook will now let Google index the mobile app from the search engine.
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
Online privacy is an issue that worries a lot of people. Here are ten basic tips on how to protect your personal data online.
What does Google know about you and me? Let’s check it with the new “About me” tool.
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. But let’s not make the kids a part of our life-long promo.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
Yesterday The European Court of Justice ruled that the Safe Harbor agreement is invalid: what does this decision mean for your personal data?
Are you committing these six online parenting sins? If so, please stop.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
By tracking your online activities, advertisers adapt their banner adverts and ad modules. If you don’t want to be tracked, enable the Private Browsing feature.
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.