How scammers hijacked QQ accounts in a phishing QR-code attack.
How cybercriminals extract bank card details pretending to be DHL.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Meet Valter Generoso, Technical Account Manager at Kaspersky Latin America.
Our experts studied the shadow market for initial access to corporate infrastructure.
We explain how to best secure your Vivino profile.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.
Our experts studied the WinDealer malware created by the LuoYu APT group.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
What should an incident response specialist be able to do and how can they improve their skills?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
How to check for hidden cameras in a hotel room or rented apartment.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
How to stay productive while learning from a distance.
Skills children need to survive in the digital world.
Free yourself from social media and start living again.