False Perception of IT Security: Passwords
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
535 articles
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
Technology evolves in a way that no one can predict or foresee. Accepting that fact, let us recall the geeky sci-fi fantasies from as far back as the 1960s, such
Time and time again did we write about the dangers public Wi-Fi hotspots pose to users, but today we are talking about threats coming specifically from home wireless networks. Many
If December means predicting the new year in the security world, then it also means recapping the year that’s about to end. And that’s just what Kaspersky Lab’s Global Research
This is the first blog post in a series of posts where I will try to document some of the false perceptions about IT security — and believe me, there
Today, we are returning to our favorite topic of mobile solutions, or more accurately, the un-installation procedure. There have been a number of inquiries on our corporate forum describing the
I have three kids. The eldest is so mature he has migrated to his own laptop (which I successfully ‘upgraded’ with parental control to prevent any inappropriate content from popping
What do you do when software asks to update? Do you constantly put it off or close the program? If you do, then you should probably continue reading… Many
Technology is progressing at a frightening pace and is now part and parcel of our everyday lives. However, despite all the breakthroughs, everything is not as it seems. People are no longer
Last week we looked at the Electronic Frontier Foundation’s secure messaging scorecard and made a list of nine mobile and Internet messaging services that scored well on privacy and security. Today, we’re
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
It’s 2014, Lockheed Martin recently announced that it is making real progress toward developing a compact nuclear fusion reactor capable of providing unimaginably vast supplies of energy in exchange for
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.