How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
How we optimized our solution for ATM protection, and why.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Security-as-a-Service is the future of information security.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
Another reason not to share everything online.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
Lake City, Florida, joins the list of ransomware victims — and decides to pay.
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
How secure are the most popular videoconferencing apps?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
Ten smart mobile games and educational apps for your child to enjoy and benefit from.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
We explain quantum computers with the help of cats and light bulbs.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
We explain how to hide private data in images properly, without making rookie mistakes.