130 articles
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
Living online is more comfortable than ever — do you really still need a helmet?
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
Kaspersky Safe Browser for iOS lets you filter unwanted content — violence, adult materials, drugs, and more.
Thanks to Tinfoil Hat Day, people all over the world have learned how to shield their brains from invisible foes.
Many people now do their taxes online, and cybercriminals see that as a huge opportunity to make money with phishing schemes.
The 10 essential steps that can reliably protect important files.
Kaspersky Safe Browser for iOS protects you from phishing, malicious sites, and spammy links.
The My Kaspersky website gives you remote control over the security solutions on all of your devices.
How to choose an antivirus solution without falling for advertising tricks.
If you have Kaspersky Labs products installed on several devices, the most convenient way to manage them is the My Kaspersky portal.
Contrary to popular belief, viruses for Mac do exist. Other online threats put Mac users at risk as well. Kaspersky Internet Security for Mac can neutralize them all.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Independent testing agency MRG Effitas put 16 security products through their paces against a battery of malware. Here are the results.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.