On Tuesday, Kaspersky launched the 2014 release of their Internet Security and Antivirus updates. In addition to a much more polished user interface, Kaspersky brings a slew of under the hood improvements and performance gains across the board. New in 2014 is the Application Control center, a hybrid between a system monitor and task manager that also gives you a trust rating of each running application. For full review or to download a trial, click on the Download button below.
Kaspersky Internet Security 2014 returns as a top-notch security suite with improved overall performance, a slight interface refresh, and new countermeasures against zero-day attacks.
Since last year's release, Kaspersky 2014's design comes with minimal changes to its interface. The mobile-style drawer also makes a return, which reveals extra tools like parental controls, network monitoring, and application controls.
The extraneous arrows and flap-like carousel buttons have all been consolidated into a single-drawer button, following Windows 8-like behaviors. The main interface has been stripped down even more for a much cleaner, uncluttered look.
Menus and settings have also gotten a … Read more
Edward Snowden's first fateful meeting with the journalists who helped him spill the beans on NSA surveillance was straight out of a spy novel.
Snowden guarded his communications using heavy encryption and used a Rubik's Cube to identify himself to Guardian reporter Glenn Greenwald and documentarian Laura Poitras. In a far-reaching interview with The New York Times, the two journalists revealed how they first met Snowden and got a look at classified documents on U.S. government surveillance programs.
Snowden originally reached out to Greenwald, but it was Poitras who established a line of communication with the then … Read more
If you would like to encrypt a file or two on your Mac to keep it secure, there are several options available to you. There are a number of third-party tools, such as GPGTools' GPG Suite, which offer encryption options for files (more details here), but Apple also offers built-in encryption support with disk images.
While securely wrapping files in disk images generally requires using Disk Utility, you can do so through the command line as well, which may be useful if you are accessing a system remotely through SSH, or scripting a routine where you would like to encrypt … Read more
No reasonable employee wants their boss to know where they are all the time.
Just as no reasonable boss wants his employees to know where she is all the time.
In the former case, those who have to drive around know that one way to get around the problem is to purloin an (entirely illegal) GPS jammer.
I understand from my underworld contacts that such a jammer can be obtained for less than $100.
The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden.
A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans."
That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in … Read more
MMS version 3 adds several new features that include custom profile setups, improved analysis of data exposure, and backup operations over Wi-Fi. These updates come alongside Mobile Security's Basic free tier features, which come with mobile antivirus, anti-theft, and backup services. McAfee's mobile efforts focus on using both preventative and recovery measures during worst-case scenarios, with a Premium service that also comes with extra features.
According to Ari Jaaksi, McAfee's SVP of Mobile Engineering, "When consumers contemplate securing their smartphones and tablets, they often think in terms of their susceptibility to mobile malware, overlooking the very … Read more
U.S. President Barack Obama met with a number of tech figures Thursday to discuss the future of technology and its role in surveillance.
According to Politico, anonymous sources say the meeting was a closed-door affair, following a similar, off-the-record meeting between U.S. administrators, lobbyists and leading privacy campaigners. Both secretive meetings focused on the NSA controversy, as well as broader issues -- including the online tracking of consumer behavior and patterns.
Apple CEO Tim Cook, AT&T CEO Randall Stephenson and Google computer scientist Vint Cerf were present at Thursday's gathering, according to the report. In … Read more
The National Security Agency (NSA) is collecting e-mails and other text communications that are sent internationally or are received from foreign sources, a new report claims.
The NSA's e-mail data-collection efforts include both those who communicate with potential overseas targets, as well as anyone who might cite a particular individual or something even partially related to that person, The New York Times reported on Thursday, citing intelligence officials with knowledge of the agency's work.
The NSA has long conceded that it's tracking the communications of foreigners who might pose a threat to the U.S. However, the … Read more
Download.com takes a glimpse at what goes on inside one of the world's oldest and largest annual hacking conferences known to man.