What does your Android keyboard tell strangers?
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
766 articles
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
How geo-distributed companies manage their networks and provide effective data protection across the board.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Features of embedded systems and suitable protection methods for them.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.