Frequently asked questions about Kaspersky Free
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
4064 articles
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Alex Moiseev addresses the issue of transformations that happen when a business starts working with enterprises.
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Kaspersky Lab and Midori Kuma came to South Africa to educate children about the importance of online safety.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Living online is more comfortable than ever — do you really still need a helmet?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?