Explicit content and cyberthreats: 2019 report
‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most importantly, in terms of our digital content consumption. With users opting to entertain themselves online, malicious activity has grown. Over the past two years we have reviewed how adult content has been used to spread […] more…Threats to users of adult websites in 2018
More graphs and statistics in full PDF version Introduction 2018 was a year that saw campaigns to decrease online pornographic content and traffic. For example, one of the most adult-content friendly platforms – Tumblr – announced it was banning erotic content (even though almost a quarter of its users consume adult content). In addition, the […] more…We know what your kids did this summer
For many kids and teenagers, summer is all about ditching school books in favor of hobbies and fun. Every year we release a report on children’s interests, as reflected in their online activity. This summer, we investigated what they prefer in their free time. The Parental Control module in Kaspersky Lab products protects children from […] more…Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but […] more…Small users in a big network
Children use the Internet for schoolwork, socializing, watching films and cartoons, playing games and much more. But, as we all know, browsing the web can be an unsafe business. In order to control their children’s online activity many parents use specialized software – so-called parental control. This software is usually capable of controlling the amount […] more…More information
- Man accused of jamming passengers’ cell phones on Chicago subway
- SpyEye botnet kit developer sentenced to long jail term
- Fallen for a fake Twitter account? Here’s how to spot them
- Is Android 12 about to pop Google’s Bubbles?
- Unusual BHEK-Like Spam With Attachment Found
- Facebook, Twitter Take Down More State-Linked Accounts
- Multiple TIBCO Spotfire Products CVE-2019-17334 Remote Code Execution Vulnerability
- Another Document Targeting Uyghur Mac Users
- Microsoft Windows CVE-2016-3333 Local Privilege Escalation Vulnerability
- Free credit report site appears to be source for celebrity data