Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
How to stay productive while learning from a distance.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
We analyze some typical examples of phishing bait for movie streamers.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.
As teens spend an increasing amount of time on social media, it’s more important than ever to take care of their mental health.
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Evade spammers, take control of your notifications, and protect your Discord account from hijacking.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
We based our new threat intelligence management platform on Kaspersky CyberTrace.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
We’re acquiring an SD-WAN provider to upgrade our enterprise portfolio with SASE and reinforce XDR.
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Skills children need to survive in the digital world.
Scammers are distributing malware and adware made to look like Windows 11.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
The most sophisticated attack ever seen on any endpoint, this modular spyware lurks on Android and iOS.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
Free yourself from social media and start living again.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Here’s how to open a program if your antivirus app blocks it.
If your antivirus stops you from going to a website, don’t disable it, create exclusions.