Current status and updates regarding the implementation of our Global Transparency Initiative.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
With more than 2.5 billion gamers around the world, it’s no wonder cheats, hacks, and game modifications have spawned a multimillion dollar industry.
Dave and Jeff take a look at the future of Ring’s doorbell cams and a smart city of tomorrow, Alexas that have eyes and can walk, registering drones, and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Dave and Jeff take a look at Bitcoin mining in Georgia, Fortnite bans, the latest on gaming cheats, and more.
A study that looks at evolving market dynamics and the impact of changing client relationships and expectations on the MSP industry.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Basically, all apps collect some information about you. Using the services AppCensus and Exodus, you can find out what exactly is collected.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Small businesses may not be the main target of cybercriminals, but it does not mean an SMB will not fall victim to a supply-chain attack. How not to become collateral damage.
Cheats for multiplayer games are tantamount to malware, and their use in competitions to cybercrime.
Eugene Kaspersky on why Kaspersky Lab became simply Kaspersky — and the plans behind that change.
Faster, better, more secure – find out what else has changed in the 2020 versions of Kaspersky security solutions.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
Fibaro Smart Home Centers can be hacked, and the consequences for smart home owners are big.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
World Cup 2018 is coming. If you’re going to Russia, you’ve gotta be prepared. Take our quiz and find out if you are ready!
What if you turn off Kaspersky Secure Connection but need it to automatically turn on again in dicey situations
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Did you know that the new features of Kaspersky Internet Security will protect you from the sneaky add-ons for freeware like adware, browser extensions and toolbars?