Good-gets-better-an-overview-of-IMPROVED-functions-of-KIS-2015 (1)

Good Gets Better: KIS 2015

Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose....
last_line

Antivirus: the last line of defense

Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the l...
tales-compressor

5 Myths of Antivirus

Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser...
why

How to test your protection quality?

Similar to car crash testing, you’re better off avoiding performing PC security tests yourself. Here’s what the pros have to say for a better, more-trustworthy approach.
Hash

The Wonders of Hashing

Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.