Jeff and Dave talk about US election worries, Google coming under fire for children’s privacy, another hospital hit by ransomware, plus much more.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
As soon as Facebook announced grants for coronavirus-hit businesses, scammers went phishing.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
On this episode of the Kaspersky podcast, Jeff and Dave take a look at the film The Social Dilemma, Facebook’s standoff with Ireland, and more.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
How the digitization of schooling is affecting parents and educators during the COVID-19 global pandemic.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Ten smart mobile games and educational apps for your child to enjoy and benefit from.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
10 technical tips for teachers about how to make remote learning as convenient as possible.
Our expert David Jacoby goes live with Instagram influencer Ashley James, sharing life hacks for a secure digital life.
We present four rules of safe trading for gamers who earn money from in-game trades.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.