More bad news from Yahoo
We have more bad news from the Yahoo hack: Even without a yahoo.com account, you may be at risk.
164 articles
We have more bad news from the Yahoo hack: Even without a yahoo.com account, you may be at risk.
If the rumors are true, 40 million Apple iCloud accounts have been hacked
At SAS 2016 our GReAT experts talk about a Java-based multi platform malware used by hundreds of cybercriminals for a handful of purposes
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. But let’s not make the kids a part of our life-long promo.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
Major social networks have been lately known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one
According to Nielsen’s year-old report on the state of mobile technology, users across multiple developed markets have one thing in common: they spend roughly 40% of their actual screen time
The 3Q and 4Q of 2014 were rather successful for Kaspersky Lab: our solutions became acknowledged winners of 11 independent tests (including long-term ones). Europe’s best selling computer magazine —
It’s always fun to observe commodity, non-vertically integrated tech manufacturers toss and twitch as distant rumours start rumbling about Apple entering yet another product category. Those companies don’t completely own
Though the number of high-profile announcements decreases with each passing year, one can still find lots of innovative gadgets at Mobile World Congress. We spent a few days at the event
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past.
As more and more people upgrade to the latest iPhone, there’s an increasing demand for second-hand devices. This, naturally, has led to fraudsters moving into the market as well. Thousands
Today, we are returning to our favorite topic of mobile solutions, or more accurately, the un-installation procedure. There have been a number of inquiries on our corporate forum describing the