Click Here to Accept: The Terms of Service Conundrum
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
3199 articles
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
The days of retail shopping during the holiday season have given way to the age of E-tail: Experts predict that more shopping will be done online than in physical stores
The hacking of Gmail accounts has been a constant occurrence for several years now. Those who have had their own accounts hacked know that Gmail notifies users when their accounts
A report out earlier this year indicated that robbing banks in the UK is a risky business, and not very lucrative at that: Bank burglars in Great Britain net an
Smartphones and tablets make it possible for business travelers to stay connected to their corporate networks while on the road as never before. But, like any other platform, these mobile
For users, the browser is the key to their online lives. It holds their histories, their secrets, tracks their movements and stores their passwords. So for attackers, the browser is
The reality is that, on the whole, security for gamers and gaming isn’t all that different than best practices for normal online, social networking activities. You need to maintain strong
One of the many problems inherent in social networks such as Twitter, Facebook and LinkedIn is the issue of authentication. People want to connect with their friends and colleagues, but
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder
It’s a common belief that Macs are safer than PCs because most computer viruses are designed to attack Windows machines and not Macs. Recent high-profile Mac-targeted viruses like MacDefender and
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have
Windows 8 is being touted as a major change in the way that people will use and interact with their PCs, tablets and other devices. Much of the change is
Depending on how you look at it, the security built into Apple’s latest desktop operating system is either a masterstroke in computer protection or the latest twist in the company’s
Those looking to tighten the security of their internet browsing experiences have a lot of choices these days. There is a slew of security and privacy related plug-ins available for
Android users who do not upgrade their operating systems when new versions become available jeopardize the security of their devices, according to new research from Web security firm Duo Security.
Hi, folks! For the last two weeks each and every fan of official Kaspersky Lab Facebook pages worldwide had the chance to ask our CEO, Eugene Kaspersky, anything at all
Computer viruses are scary, but they don’t always sound it – often their names are misleadingly bland or deceptive. The I Love You virus wreaked havoc in banks and security
If you are a parent who has secretly viewed your child’s Facebook profile, you are hardly alone. A new study shows that nearly 60 percent of American parents are right
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
It used to be that Mac users could rest easy, knowing that the vast majority of computer viruses were written to target Windows users, which makes sense given that the