Read highlights from our top posts in August.
Learn how to avoid becoming a victim of the wireless hack and how to control additional protection measures in our new product.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Expert reviewers are declaring KIS 2015 the best version yet, and one of the best AV products on the market.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a s...
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten the...
Sextortion is one way online predators can steal your sensitive data and use it to harm you.