
How to Prevent Identity Theft
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
1141 articles
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
“Snapchat is a new way to share moments with friends,” reads the opening sentence of the temporary photo-sharing application’s “about us” page. The description is just vague enough to technically
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
At this point, Internet Explorer, Google Chrome, Safari, and Mozilla Firefox are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions,
The privacy and censorship conscious among us are certainly familiar with Tor. Short for “The Onion Router,” Tor is a free tool that keeps a user’s Web browsing private and
Unfortunately, data theft and credit card fraud have become common worries. We wanted to find out from our Facebook users if they have ever been targeted, so we asked if
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
Everyone loves the hands-free convenience that Bluetooth enables — some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they’re
Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker
Facebook’s Like button practically begs to be clicked. It’s easy to “like” an innocuous post that pops in up in your News Feed, or send some Like Love to a
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale
Every couple of months, seemingly, the world gets up in arms about the latest changes to Facebook’s privacy policy. But Facebook isn’t the only social media site that collects and
From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first version hit the stores in
Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. But when