A platinum award from our customers
We received the Platinum Award as part of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
3758 articles
We received the Platinum Award as part of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Let’s celebrate by sharing some advice with those who need it. Here are five tips you can use to help your friends and relatives stay safe online.
The largest motor show in the world is the best place to see what cars will look like in the near future.
Let’s talk about solving blockchain’s six main problems to help it work better, faster, and more efficiently.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Cybersecurity is ever-changing how can executives stay ahead of the curve?
How facial recognition works in the new Apple iPhone X —and is it secure enough for you to usetrust?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?