Security of Electron-based desktop applications
A few words on why desktop applications based on the Electron framework should be approached with caution.
233 articles
A few words on why desktop applications based on the Electron framework should be approached with caution.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
What caused a mass vulnerability in VPN clients, and how to keep them working.
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
How scammers can hack your YouTube channel without knowing a password and second factor.
Alternatives to Google Chrome that take data privacy more seriously.
New features of the updated Kaspersky Antivirus & VPN app for Android.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
How to set up modern VPN services to significantly speed up the connection and access new content securely.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
From the fridge to TV, how we’ll embrace the year of the virtual assistant in 2023 Decades ago, futurologists and TV shows such as ‘The Jetsons’ envisaged homes filled with
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
In recent years, small businesses have increasingly become the target of man-in-the-middle cyberattacks. Protect yourself by using a VPN.