Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Tras...
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
Most free apps are not actually free. They monetize on displaying ads to you ― and sometimes it is very annoying.
Igor Soumenkov, a Kaspersky Lab contributor to the Ubisoft’s Watch Dogs script assessment, explains how close to real life the game world is.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://blog.kaspersky.com/tag/securityIS
Wireless networks are often insecure, and are notorious havens for attackers, who hang out in coffee shops, hotel swimming pools and anywhere else people congregate to the closest...