Security do’s and don’ts: Keeping weirdos aside
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
225 articles
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
For a regular user like you and me it’s hard to imagine the path of online payments and the obstacles that appear on the way of one dollar — or just
“In God we trust, the rest we check” — A wise principle when discussing computer security, especially when using QR codes. The QR code has gained popularity in recent years
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Online shopping is typically a money-saving move in and of itself, but there are tactics that you can use to keep even more cash in your pocket.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.