
16 billion passwords leaked: what should I do?
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
Researchers have found a vulnerability that allows attackers to get root privileges on most Linux distributions.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
How to assess all the complexities of open-source application integration in advance, and choose the most efficient solutions.
Internet Explorer sends its regards: a vulnerability in the HTTP protocol extension allows attackers to run malicious code — even on a modern operating system.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
Scammers are promising compensation from a bank to all comers — with no exceptions — and to boost their credibility they’ve even rolled out a deepfake newscast generated by AI.
Since 2016, a threat actor has been exploiting insecure plugins and themes to infect WordPress websites and redirect traffic to malicious websites.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Ever wondered why kids these days spend so much time online? Most parents do. So we found out what they’re actually doing there (spoiler: nothing bad).
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
How organizations implement zero-trust principles, and what CISOs advise for project success.