Usability and Security: The endless pursuit of perfection
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
1126 articles
When it comes to computers, usability and security aren’t always mutually inclusive concepts. Most times, the easier a system is to use the less protected it is. The tools used
It used to be that Mac users could rest easy, knowing that the vast majority of computer viruses were written to target Windows users, which makes sense given that the
The world of Web apps has grown at a breakneck pace in recent years. That’s been good news for consumers and it’s been utterly fantastic news for attackers, who have
If you own an Android device, your phone could soon be used against you. Research released in late September introduced a new tool that targets Android devices by taking control
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Look at any one of the dozens of reports about cybercrime levels, and you’ll inevitably come away with the conclusion that online crime is getting worse by the day. And
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
There’s no two ways about it, cybercrime is big business. Accurate estimates are hard to come by, but you can safely assume it’s well into the billions of dollars. Likely
Yes, this is the most secure version of the Windows Store ever. Sure, it’s also the first version of the Windows Store, but Microsoft knows that the basic mechanics of
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study
Ryan Naraine interviews Kaspersky Lab Chief Technology Officer, Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky lab’s vision for protecting