We present you a simple, but quite versatile algorithm for checking information on the Internet.
Kaspersky have a new service that allows our threat intelligence customers to take down malicious and phishing sites.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
Our experts have discovered a malicious campaign targeting fintech companies.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
We explain how cookies affect your privacy online.
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Evade spammers, take control of your notifications, and protect your Discord account from hijacking.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Can you be sure your employees are working responsibly with personally identifiable information?
Our Danish colleague spilled a lot of cybersecurity ink in his works.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
A look at what’s changed in the Matrix in the 18 years since the last update.
A cyberattack has affected an unexpectedly large number of industrial systems.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Tips on security and productivity for those who work both from home and in an office.
Skills children need to survive in the digital world.
How to set app permissions in iOS 15 for maximum privacy and security.
How to check for hidden cameras in a hotel room or rented apartment.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
How to stay productive while learning from a distance.
Free yourself from social media and start living again.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Here’s how to open a program if your antivirus app blocks it.