• Post Of The Day
  • Privacy
  • Tips

Setting app permissions in iOS 15

How to set app permissions in iOS 15 for maximum privacy and security.

  • Business
  • SMB

What not to keep in your mailbox

Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes,…

  • News

Transatlantic Cable podcast, episode 229

This week on the Kaspersky podcast, Ahmed, David and Jeff discuss Facebook’s haptic glove, Rent…

  • Business
  • Enterprise
  • SMB

Five problems of telehealth

Report on the research about the applied telehealth practices, views on the development and the…

  • Tips

How to survive remote learning

How to stay productive while learning from a distance.

  • Business
  • Enterprise
  • SMB

Invisible implants in source code

Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.

  • Business
  • SMB
  • Threats

Businesses’ proxyware headache

Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.

  • News

Transatlantic Cable podcast, episode 228

Emotet is back, some REvil arrests, and Twitter cryptovigilantes let loose — it’s all happening…

  • Threats

Phishing in Netflix and beyond

We analyze some typical examples of phishing bait for movie streamers.

  • Business
  • Enterprise
  • SMB

Phishing disguised as spam

Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam…

  • Products

More speed, more features with Kaspersky VPN Secure Connection

With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.

  • Tips

Protecting teens’ mental health on social media

As teens spend an increasing amount of time on social media, it’s more important than…

  • Business
  • Enterprise

How to scan files in a public cloud

To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan…

  • News

Transatlantic Cable podcast, episode 227

Squid Games crypto scams, DarkSide ransom, and Facebook decides to shutter its facial recognition system.

  • Threats

Fake LinkedIn notifications

We look at some examples of LinkedIn phishing and explain how everyone can avoid taking…

  • News

Community Conversations, episode 4

A conversation with Allison Pytlak of Reaching Critical Will to discuss why we need more…

  • Business
  • SMB

Kaspersky CyberTrace as a threat intelligence platform

We based our new threat intelligence management platform on Kaspersky CyberTrace.

  • Threats

Malicious activity in Discord chats

In the wake of recent research, we talk about several scenarios that underlie malicious activity…

  • News

Transatlantic Cable podcast, episode 226

This week on the Kaspersky podcast, Ahmed, David, and Jeff discuss the latest with REvil,…

  • Tips

Seven digital habits for today’s children

Skills children need to survive in the digital world.

  • Special Projects

The world is not enough

Six interactive globes with useful or quirky visualizations.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Read More