Zero-day vulnerability in Internet Explorer
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
772 articles
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
How geo-distributed companies manage their networks and provide effective data protection across the board.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Features of embedded systems and suitable protection methods for them.