Dangerous browser extensions
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
3876 articles
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
SOC Experts Victor Sergeev and Ahmed Khlief demonstrate the differences between compromise assessment, incident response, penetration testing, and MDR.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Four handy ways to lock your screen on Windows and macOS.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.