A pain-free guide to installing Android updates
A look at the pros and cons of updating Android — and ways to do it safely.
766 articles
A look at the pros and cons of updating Android — and ways to do it safely.
Adopting a Human Factor 360° model to assess the global cybersecurity landscape.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Some thoughts on what PC software patches should be prioritized and why.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Explaining an issue in popular PC and server CPUs in simple terms.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
What caused a mass vulnerability in VPN clients, and how to keep them working.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?