More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
To counter modern ransomware threats, you need more than just endpoint protection.
VDI requires tailored protection. We provide it.
Jeff and Dave discuss Amazon going after influencers hawking bootlegs goods, COVID-19 researchers under attack, and more.
Seven safety and security rules to keep in mind when buying games and in-game items.
Jeff’s favorite questions and answers from Kaspersky’s Global Research and Analysis Team’s recent Reddit AMA session.
Research seeks to understand key drivers of the future of work.
Jeff and Dave discuss the Silk Road cash-out, a Trump site leaking voter details, ransomware at Compal, and more.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
Security training aimed at IT teams, service desks, and other technically advanced staﬀ.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Ten tips to make your private digital life really private.
A complete guide to security and privacy settings for your Battle.net account.
These handy tools make watching shows on Netflix even easier and safer.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.