
Tip of the week: How to eliminate gaming and Internet distractions while working
Kaspersky Internet Security has a feature that may help you take control over the time that you spend on gaming and on the Internet, and it is called parental control.
3243 articles
Kaspersky Internet Security has a feature that may help you take control over the time that you spend on gaming and on the Internet, and it is called parental control.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
When you want to save money by buying an antivirus from untrusted online sellers, you ultimately risk your money and might land in trouble afterwards.
There’s been much hoopla in recent weeks over claims from Apple and Google that user content stored in the latest iterations of the iOS and Android operating systems is encrypted
It’s 2014, Lockheed Martin recently announced that it is making real progress toward developing a compact nuclear fusion reactor capable of providing unimaginably vast supplies of energy in exchange for
In the 2014 version of Kaspersky Internet Security, the advanced settings of protection components were removed. The decision was preceded by countless arguments and discussions on this topic. Countless times we
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.
Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands.
With the Parental Control component, you can not only limit the time that your child spends on the computer, but you can also establish restricted applications.
Using a trojan malware with the Russian name, Tyupkin, hackers made cash withdrawals without so much as accessing bank accounts.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.