
7 Steps to Avoid Phishing Attacks on Your Facebook Account
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
560 articles
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
According to a number of reports, Intel and IBM are scouring the job market for Bitcoin experts. We at the Kaspersky Daily weren’t quite sure why the two tech giants
The 3Q and 4Q of 2014 were rather successful for Kaspersky Lab: our solutions became acknowledged winners of 11 independent tests (including long-term ones). Europe’s best selling computer magazine —
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
At the Mobile World Congress in Barcelona earlier this month, Android smartphone giant, Samsung, released its mobile payments platform, Samsung Pay. The name will almost certainly draw comparisons to Apple
MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further:
The latest in a long line of whistle-blower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of
It’s the beginning of February and we’ve already seen three Adobe Flash zero days, an Internet wide-vulnerability in Linux and our first massive data breach of Anthem Inc., an enormous
The popular mobile messaging service WhatsApp released WhatsApp Web late last month. The service will allow users to run WhatsApp on their favorite Web browser — so long as their
Once a user looks up a laptop or a slow cooker online, advertisements from online stores will begin to appear as if from the horn of abundance. This is exactly
“In God we trust, the rest we check” — A wise principle when discussing computer security, especially when using QR codes. The QR code has gained popularity in recent years
Have you ever wondered how a typical office would look like in a decade or so? The first things to come to your mind is likely to be some pseudo
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we