Myths and reality regarding Cyber Immune technologies
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
194 articles
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
This report examines which apps kids spend most time on, and what specifically caught their interest this summer (June through August 2023).
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Why such OSs are gaining more significance in markets in need of security.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Better put them on something not very valuable or necessary. Here we explain why.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
From the fridge to TV, how we’ll embrace the year of the virtual assistant in 2023 Decades ago, futurologists and TV shows such as ‘The Jetsons’ envisaged homes filled with
A few words about why Telegram isn’t as secure as its developers boast.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
A year after discovery, the Log4Shell vulnerability is still making itself felt.
The specifics of protecting and updating the OT infrastructure.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
What to pay attention to as to minimize the outcome from cyberincidents in an industrial facility.
Remembering 2021’s most interesting infosec events — in memes and tweets.