Switching to Kaspersky: a step-by-step migration guide
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
760 articles
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Features of embedded systems and suitable protection methods for them.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
Adopting a Human Factor 360° model to assess the global cybersecurity landscape.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?