Five ways to protect your private photos
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
683 articles
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
Kaspersky Lab upgrades its flagship security solutions to 2016 versions
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security.
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
For a regular user like you and me it’s hard to imagine the path of online payments and the obstacles that appear on the way of one dollar — or just
Blackhat, directed by Michael Mann (Heat, The Last of the Mohicans) is a digital whodunit about a pair of cyberattacks and the duo of unlikely bedfellows — a colonel on
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Researchers at Kaspersky Lab have uncovered a new variant of the infamous Zeus Trojan. It’s called Chthonic, a reference to spirits or deities from the underworld in Greek myth, and