Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
Scammers set a Lightshot trap for greedy cryptoinvestors.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
Files with the TXT extension are typically considered safe. Are they, though?
This week on the Kaspersky podcast, we discuss the state of financial cyberthreats.
Ransomware, once represented by screen blockers that were almost cute, has come of age.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
What’s the difference between the malware adapted for Apple’s new M1 chip and the sort written for good old x86 processors.
Gut-wrenching stories of in-game cheating told by actual participants.
Evade spammers, take control of your notifications, and protect your Discord account from hijacking.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
A vulnerability in Google Chrome has already been exploited by malefactors. All users need to update to version 89.0.4389.90.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Ten tips to make your private digital life really private.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.
Keep outsiders off your wireless network.
It’s been a full year since the pandemic officially began. What have the new and challenging conditions taught us?
The hit app has had some security issues.