No Shortage of Mobile Secure Storage Apps
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
3226 articles
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Kaspersky Internet Security for Mac recently received an Approved Security Product award by AV Comparatives in a malware protection test run by the independent anti-virus software tester. There’s been a
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
Quantum computing and quantum communications; these concepts were invented just 30 years ago, after scientific journals refused to issue earlier publications regarding these subjects because it looked more like science-fiction.
The time: 6.30 pm The date: a dusky evening in early autumn (3 October to be precise) The place: The Mayor of Scaredy Cat Town, a subterranean ‘speak-easy’ bar in
With 125,000 new malicious programs appearing every single day — antivirus protection is a necessity, not a luxury. Your PC needs effective antivirus defence and you deserve an antivirus solution
Today is Eugene Kaspersky’s birthday. As he celebrates the passing of another year, you can see from our infographic that the year in question has been fairly busy.
Gaming has been around for decades, and along with all of the new advancements that have been made in technology over the years have come advancements in the way we
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behaviour is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Another month has quietly slipped away and you’ve found yourself wondering if you’re all caught up on our articles from September. Not to worry, we’ve rounded up our top posts
Do you have a personal computer at home that is not actually personal because it is meant for family use? Do your loved ones use it for work and Internet
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Congratulations to our fourth stage winner in Kaspersky Lab’s 7 Volcanoes contest – Laura from Ireland! Laura entered the contest on behalf of her parents as a surprise gift to thank them
Your family’s phones or tablets store a lot of precious personal data — so how do you protect them from malware, Internet threats and the risk of loss or theft?
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of September 2013. [audio https://kasperskydaily.com/global/files/2013/09/podcast_september_Brian.mp3] Download podcast for offline listening
There are potential risks that we all face online. These include malware, phishing scams and junk-mail. But there’s an added dimension where children are concerned. They’re less worldly-wise, so they
Passwords, the de facto authenticators, represent a serious security weakness for a number of reasons: chief among those is that humans quite simply tend to create bad passwords in order
Our anti-virus products are constantly being tested and improved. Even when a product has been released, we continue to work on updating our packages. Our updates are always designed to
To complete our series of articles on licensing for Kaspersky Lab products, we would like to touch upon another common case; reinstalling the system. How can you do this without