The perils of short links
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
1182 articles
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
In episode 313, the team look at Quantum resilient FIDO keys, Duolingo data breach and Interpol arrests
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
It means that some companies still have not installed MS Office patches that were published 5 years ago.
How cybercriminals force victims to work for them with offers of easy money.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.