
Bugs and Scams and WhatsApp Web
The popular mobile messaging service WhatsApp released WhatsApp Web late last month. The service will allow users to run WhatsApp on their favorite Web browser — so long as their
547 articles
The popular mobile messaging service WhatsApp released WhatsApp Web late last month. The service will allow users to run WhatsApp on their favorite Web browser — so long as their
Once a user looks up a laptop or a slow cooker online, advertisements from online stores will begin to appear as if from the horn of abundance. This is exactly
“In God we trust, the rest we check” — A wise principle when discussing computer security, especially when using QR codes. The QR code has gained popularity in recent years
Have you ever wondered how a typical office would look like in a decade or so? The first things to come to your mind is likely to be some pseudo
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Researchers at Kaspersky Lab have uncovered a new variant of the infamous Zeus Trojan. It’s called Chthonic, a reference to spirits or deities from the underworld in Greek myth, and
It was an enjoyable Saturday night, when a friend of mine suddenly received an SMS notification telling him that his card had been charged 550 EUR… in Greece. “What the…?”, was
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
Technology evolves in a way that no one can predict or foresee. Accepting that fact, let us recall the geeky sci-fi fantasies from as far back as the 1960s, such
Time and time again did we write about the dangers public Wi-Fi hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many
If December means predicting the new year in the security world, then it also means recapping the year that’s about to end. And that’s just what Kaspersky Lab’s Global Research
This is the first blog post in a series of posts where I will try to document some of the false perceptions about IT security — and believe me, there
Today, we are returning to our favorite topic of mobile solutions, or more accurately, the un-installation procedure. There have been a number of inquiries on our corporate forum describing the
I have three kids. The eldest is so mature he has migrated to his own laptop (which I successfully ‘upgraded’ with parental control to prevent any inappropriate content from popping
What do you do when software asks to update? Do you constantly put it off or close the program? If you do, then you should probably continue reading… Many
Technology is progressing at a frightening pace and is now part and parcel of our everyday lives. However, despite all the breakthroughs, everything is not as it seems. People are no longer