The perfect storm of Android threats
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Researchers have discovered that styling prompts as poetry can significantly undermine the effectiveness of language models’ safety guardrails.
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Eight digital New Year’s resolutions you absolutely need to keep.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.