Why a thin client is better than a workstation?
We explain why it’s preferable to use a thin client (especially running the updated Kaspersky Thin Client 2.0) in virtual desktop infrastructure
3876 articles
We explain why it’s preferable to use a thin client (especially running the updated Kaspersky Thin Client 2.0) in virtual desktop infrastructure
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Let’s talk about our updated line of corporate security solutions.
How to tell a real photo or video from a fake, and trace its provenance.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
A backdoor implanted into XZ Utils has found its way into popular Linux distributions.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
In 2023, our products and solutions took part in precisely 100 independent studies — winning 93 times: our best year ever.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.