Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
Your online finances need proper protection. Learn how to secure your PayPal account.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
Life has made a dramatic shift online in 2020. Our solutions will help you avoid unnecessary stress in the new reality.
On this episode of the podcast, Dave and Jeff discuss large companies being hit with ransomware, the speedrunning world record, and more.
You can refuse some permissions to greedy games, and they most definitely do not need these five.
Many services allow you to share your subscription with family. Here’s how popular sites handle sharing.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?
It’s a new speedrunning world record — made with Kaspersky Internet Security working in the background.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
Five things that, if neglected, can cost SMBs dearly.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
We explain why you need to back up critical data, even if you trust your equipment 100%.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
You can design a digital comfort zone you won’t want to leave.
What you need to check regularly to keep your Android smartphone and your data safe and sound.
The Safe Search in YouTube feature prevents children from stumbling across violent, sexual, and other unwelcome content.
We explore how encryption protects your data and why quantum computers might shake things up.