Kaspersky calls for ethical use of AI in cybersecurity
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
760 articles
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Some thoughts on what PC software patches should be prioritized and why.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Explaining an issue in popular PC and server CPUs in simple terms.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
What caused a mass vulnerability in VPN clients, and how to keep them working.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.