The security aspect of employee offboarding
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
1074 articles
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
It means that some companies still have not installed MS Office patches that were published 5 years ago.
How cybercriminals force victims to work for them with offers of easy money.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
How scammers can hack your YouTube channel without knowing a password and second factor.
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.