
What you should know getting started with your new Apple iPad
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
3964 articles
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
While many got a good laugh about CryptXXX evolving to beat out tool, ransomware is no laughing matter. Introducing V2 of our tool.
Gartner’s Magic Quadrant is a tool that helps to choose which vendor fits organizations best for a particular business purpose. It is designed for CIO’s, decision makers, and IT-security specialists of the businesses.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Do you know how many companies are actually tracking you when you visit a single website? The answer may surprise you.
Discussing what kind of Internet Chinese, North Korean and Indian users have now and what we all might have one day
A 10-year old from Finland successfully discovered and reported an Instagram flaw, and was handsomely rewarded by Facebook.
Locky and Petya ransomware strains took the world by storm when they shouldn’t be successful at all.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Securelist has released a new report on DDoS attacks in the first quarter of 2016.
Reasons why you should pony up the money for your own Wi-Fi and stop stealing it from your neighbors.
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
Kaspersky Lab’s GReAT expert Ryan Naraine offers tips to avoid falling victim to ransomware.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Once considered a top 10 pick in the NFL Draft, Laremy Tunsil slides to Twitter hack, followed up with Instagram hack.
Free Kaspersky Virus Removal Tool helps cleaning up PCs, which have no antivirus installed.
Remember the beginning of Terminator 2: The Judgement Day where John Connor is shown hacking an ATM with an Atari Portfolio?
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
We talk about ever-present connectivity. What does that mean for raising kids?