Kids and cybersecurity: what parents should be aware of in 2024
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
887 articles
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Cybersecurity trends to consider and new threats to protect against in 2024.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Episode 328 of the Kaspersky podcast includes historic EU A.I regulation deal, Evil ChatGPT? and even more A.I!
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
Adopting a Human Factor 360° model to assess the global cybersecurity landscape.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Cybersecurity Alphabet This cybersecurity alphabet is a fun and informative book that teaches kids how to recognize fraudsters’ tricks and learn the importance of staying safe online. Dear friend, You’re
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
Examples of how QR codes in emails are used for phishing.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
How to protect a company’s reputation from illegal use of its name on the internet.