If you use an ATM card, you are of interest to carders. How do these criminals act and how can you keep your bank account safe?
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
A researcher has developed a nasty bootkit capable of taking complete control of OS X devices. Here is what you need to know.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We have a special solution for multi-device users. If you are using our products on many devices, we recommend you register on the My Kaspersky web portal.
We collected the 10 best tweets related to an IT security event in 2014.
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.