Phishing 101: Your Official Guide
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
3215 articles
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
You can tell your kids to stay off the social networks and you can tell yourself that they’ll listen, but chances are they’ll find a way on, anyway. So we’re
Considering the rapid proliferation of smartpones and tablets and the vast wealth of personal and financial data many of us store on them, it is increasingly important that we find
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Look at any one of the dozens of reports about cybercrime levels, and you’ll inevitably come away with the conclusion that online crime is getting worse by the day. And
Wireless Internet access has to go down as one of the handful of best technological advances in the last 10 years. It’s hard to even remember what it was like
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
There’s no two ways about it, cybercrime is big business. Accurate estimates are hard to come by, but you can safely assume it’s well into the billions of dollars. Likely
Eugene Kaspersky has had an interesting, varied life, with more than his share of adventures, successes and challenges. He’s seen and done a lot, but when he learned that he
The next version of Internet Explorer, IE 10, is designed by default to prevent your online activity from being tracked by would-be advertisers. But that may not stop advertisers from
If you use Google Chrome as your web browser and you hate Facebook’s new Timeline layout, attackers are looking for you. Lots of people have griped about Timeline since Facebook
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out
As the use of Smartphones continues to grow in the U.S., the majority of users are very sensitive about how much personal information they have to share when downloading apps
Yes, this is the most secure version of the Windows Store ever. Sure, it’s also the first version of the Windows Store, but Microsoft knows that the basic mechanics of
PROS Awesome design First of all, the Metro interface looks amazing. It is very light, clean and simple. The user experience is a result of the developer’s abilities to follow
A bug in the iPhone means that users shouldn’t necessarily trust that text messages they receive are coming from the phone numbers they claim to be sent from. According to
As you already know, Windows 8 has some major differences from Windows 7. In order to provide the best and most secure user experience, we created KIS2013 and KAV2013 modified
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study
Ryan Naraine interviews Kaspersky Lab Chief Technology Officer, Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky lab’s vision for protecting
In today’s world, we’re all carrying multiple digital devices that require protection from cybercrime. Kaspersky ONE makes it easier than ever. With just one license, you can conveniently secure any
It’s no longer just your PC that needs protection. These days your information lives on multiple devices – your smartphone, your tablet, even your Mac – & you want to