
Again, SnapChats Are Not Fleeting
Everybody knows that nothing on the internet really goes away forever – except for maybe our privacy and dignity. So when we heard about SnapChat: a service that allegedly lets
1141 articles
Everybody knows that nothing on the internet really goes away forever – except for maybe our privacy and dignity. So when we heard about SnapChat: a service that allegedly lets
In most cases, the “free” Android applications you download from Google’s Play store aren’t free at all. These developers aren’t just developing apps for you out of the kindness of
Imagine if in the early days of the Internet boom someone other than Bruce Springsteen himself had purchased the domain brucespringsteen.com. Now imagine that that person used the website to
Most of us can no longer imagine a world in which we aren’t digitally connected at all times, and cybercriminals are well aware of this. With the growing importance of
Banking trojans are like rats, you kick a rubbish bin and six of them go scurrying off in every direction. Most of them you’ll read about once and never again.
The Wi-Fi alliance, an almost absurdly large consortium of communications, technology, and manufacturing companies, has launched an initiative aiming to strengthen the security and reliability public wireless hotspots. Known as
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defence against having your personal data and your money fall into the hands
When we enter the adult world, we tend to put a lot of care into building and cultivating our reputations. The way we present ourselves and the way others perceive
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behaviour is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Congratulations to our fourth stage winner in Kaspersky Lab’s 7 Volcanoes contest – Laura from Ireland! Laura entered the contest on behalf of her parents as a surprise gift to thank them
Award-winning multi-device protection for your PC’s, Macs, Android smartphones and tablets. Kaspersky Internet Security — Multi-Device is one simple security solution to protect your PCs, Macs, Android smartphones and tablets. Kaspersky
That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
You might think that, much like a pirate going into battle, the more weapons you have at your disposal for your protection the better: cutlass in one hand, pistol and
Protecting your home network is as daunting a task as you make it. If your home network consists of a wireless router and a laptop, then it’s pretty easy to
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside