10 steps to boost your iPhone’s battery life
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
987 articles
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
eBay user passwords compromised in data breach; another Internet Explorer zero-day for Microsoft; Samsung eyes iris authentication; and patches from Chrome.
What Facebook habits make you vulnerable and how to avoid them.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft’s end of security support for Windows XP
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
With each passing year, the mobile malware landscape continues to evolve. It’s now driven by groups of criminals working to carry out large scale attacks and earn substantial profits. There
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of
It seems Santa’s reindeer could be deprived of their usual Christmas duty by 2016, as Amazon would arrange for your Christmas presents to be delivered via air drones. Moreover, the
From takeoff to landing, the U.S. Federal Aviation Administration and its counterpart in the European Union have cleared the use of computers and mobile devices, though flyers will still be