If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
A shared work environment can facilitate malware distribution. We have just the means to stop it.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Jeff and Dave discuss COVID-related scams in the UK, a Massachusetts school system hit with ransomware, and more.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Cybercriminals are using steganography to hide their code and seek industrial data.
Jeff and Dave chat about the MosaicRegressor UEFI bootkit, a Grindr copy-paste hack, and more.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Ten tips to make your private digital life really private.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
By training your kids’ social media feeds, you can fill them with educational content.
10 technical tips for teachers about how to make remote learning as convenient as possible.