The ForumTroll and his colleagues
Our experts have found common tools used by both the ForumTroll APT group and attackers using Dante malware by Memento Labs.
Our experts have found common tools used by both the ForumTroll APT group and attackers using Dante malware by Memento Labs.
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
The optical sensors in computer mice can be used for eavesdropping. We break down why this is fascinating — but still a long way from real-world practicality.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
A step-by-step guide to deleting as much of your digital footprint as possible.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
How attackers can hijack your computer through its webcam — and how to stop it.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?