
A Week in the News: Metadata, Zero Days, MH 370 Phishing and More
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
1141 articles
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Perhaps it has happened to you. One day you open your Internet browser and instead of going to your usual homepage, you go to the landing page of a search
Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC. But nevertheless, you have an opportunity
A variety of methods can lead users to malicious sites, but the one known as “typosquatting” relies entirely on unforced user error.
A number of Samsung’s popular Galaxy devices reportedly contain an alleged backdoor that could give attackers remote control of vulnerable handsets, effectively turning successfully exploited phones into mobile spying machines.
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,
No doubt it has been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin exchange marketplace out there, has shut down, putting a
The Onion Router Tor, one of the resources on Darknet, has been known for a long time. At first it was only known of by experts and enthusiasts interested in
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as
What if your computer ran an anti-theft software you never activated? A software that can make your PC remotely accessible. A software that you can’t delete, even by physically replacing
During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
Kaspersky Daily editor Brian Donohue sat down with Dr. Charlie Miller, the notorious Apple hacker and Twitter security engineer, and Chris Valasek, the director of security intelligence at IOActive, for
What will happen if the prince tells the princess not to install Kaspersky Internet Security for free?
Valentine’s Day is upon us and there is no sweeter gift to give to your significant other than the gift of security. If you’ve been following our posts then you’re
With the continuous advancements made in technology, our online experiences are becoming more streamlined and seemingly user friendly. We no longer require stationary desktop computers to access the Internet, but
PUNTA CANA – A hacking group likely backed by an unknown national government has been targeting government agencies, embassies, diplomatic offices and energy companies for more than five years in
Tomorrow is Safer Internet Day. You must know you can make your own Internet experience a lot safer without big technology or tough measures. All it takes is just a
Protect your personal data on your mobile device with Kaspersky Internet Security for Android. If your device is lost you can wipe data to remain secure.