Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
What exactly do those age restrictions mean? Can a 10-year-old play a 12+ rated title?
Dave and Jeff discuss Facebook’s European plea for regulation, Black Energy spreading on the dark web, Boston Children’s Hospital faces a cyberattack, and more.
What exactly was certified and how the certification was performed
What is the story with Microsoft, Kaspersky and KB 4524244 security update all about?
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
Lake City, Florida, joins the list of ransomware victims — and decides to pay.
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Four steps to reduce your company’s IT carbon footprint — and save money.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Small businesses may not be the main target of cybercriminals, but it does not mean an SMB will not fall victim to a supply-chain attack. How not to become collateral damage.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Cheats for multiplayer games are tantamount to malware, and their use in competitions to cybercrime.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
Ten tips to make your private digital life really private.
The most sophisticated attack ever seen on any endpoint, this modular spyware lurks on Android and iOS.
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
If you get worried when your child hangs out with friends for too long or fear they might be skipping classes, use Kaspersky Safe Kids.
Do your children spend all their time on their computer or smartphone? Kaspersky Safe Kids can help.