626 articles
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
A brief video tutorial on how to enable a number of important security and privacy features built into Google’s Gmail service.
Windows Phones continue to grow in popularity, which means users should take precautions to make their devices as secure as possible.
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
Hack your way through the smart city of the future in the upcoming Watch_Dogs game. Reality checked by Kaspersky.
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Microsoft Internet Explorer and Adobe Flash Player zero-days replace OpenSSL Heartbleed as the primary topic of discussion in this week’s security news.
April brought with it some of the biggest security news any of us have seen in quite some time. If you missed any of our coverage or any of our posts from the month, it’s time to catch up now!
Top Apps to protect you from prying eyes, mischievous kids, thieves, natural disasters, forgetfulness and of course malware.
Have sensitive contacts to hide? There is a way to conveniently hide them on your smartphone.
In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
Frequently asked questions about Kaspersky Internet Security for Android are answered!
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
In the news this month: more transparency reports, Microsoft zero days, data breaches, and NSA revelations. WhatsApp – the popular global messaging service – is acquired by Facebook, much to
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you
Even though February is the shortest month of the year, we still have plenty of top stories to share with you, keeping you in the know when it comes to