Security do’s and don’ts: Keeping weirdos aside
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
246 articles
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Did you have a nice chat with your friends last time you met them? Or were you all only taking pictures of the meals for Instagram, and commenting each other on Facebook?
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
The new product of ours, Kaspersky Total Security, has just hit the shelves, and our customers have been bombarding us with questions ever since: “What are the key differences between
The times when people used just a desktop computer for their work and leisure are long gone. In the last few years, there has seen an explosion in phones, tablets
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
Time and time again did we write about the dangers public Wi-Fi hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many
I have three kids. The eldest is so mature he has migrated to his own laptop (which I successfully ‘upgraded’ with parental control to prevent any inappropriate content from popping