Kaspersky Password Manager gets a new look
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
772 articles
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
Rules for detecting atypical behavior in container infrastructure at the data collection stage, and other updates to our SIEM system.
Many of us have dozens of online subscriptions and recurring payments. How to take control, save money, and stay on top of expenses?
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
We’ve discovered a new Trojan that’s very selective about its victims.
Our developments, products, research, patents and expert teams harnessed for AI.
An Office 365 security alert as bait in a phishing email.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Why and how to create a local backup of cloud data, taking Notion as an example.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.