As Ice Bucket Challenge Goes Viral, Scams Follow
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
645 articles
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
The next page of The Сyberworld Survival Guide. The entire guide can be found here: https://www.kaspersky.co.uk/blog/tag/securityIS Preparing for a forthcoming Halloween Max decided to wear a costume of Internet-anonymizer.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
Some things we routinely do in the office are dangerous for careers as they pose significant risk to the company’s business. It’s equally relevant for CEO and intern alike, so watch out!
No one likes support helpline queues, and we have some tools to provide you with an answer to your question almost instantly.
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
Senior Security Researcher David Emm explains exactly what GameOver Zeus means for you, and how you can keep yourself protected.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.