Why do you need Kaspersky Protection browser extension?
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
112 articles
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
It’s hard to secure a home network, which includes various devices like PCs, laptops, tablets and smartphones. One vulnerable gadget puts all of the others at risk. But if Kaspersky
The Internet changes from year to year and online threats develop along with the World Wide Web. So what will the cyber-nightmare of home and corporate users look like in
Passwords have been around since the early days — in 200 B.C., the Romans used them on a day-to-day basis to organize and manage actions of military units. With the
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
Nearly everyone has faced a cyber criminal’s activity at one point or another. You have probably received a magical SMS that read something like: “You are the winner!!! Your Ferrari
At the Cyber Security Summit 2015 in Boston Joseph Bonavolonta, Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office, revealed how the bureau treats ransomware. “To
The old saying goes that “the walls have ears,” something similar can be said about computers. It seems like every day brings another data breach, malware or phishing attack –
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
Do you consider yourself cyber-literate? Have you been so immersed in the online life so you can tell what’s real and what’s fake? We recently decided to test our reader’
When you search, watch, read, or purchase anything online, the information on your clicks, search inputs, visited websites, or purchases article is logged. This data is available to both website
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they