
Know your personal threat landscape
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
756 articles
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
On this edition of the Kaspersky podcast, Ahmed and Jeff discuss AI from finding phishing to should we stop and under $200 will buy you a deepfake.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
The pros and cons of different approaches to deploying and maintaining information security systems.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Better put them on something not very valuable or necessary. Here we explain why.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
Could someone be viewing your private photos while your device is being repaired?
Microsoft plans to throttle and block email from vulnerable Exchange servers to Exchange Online.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
Business is actively moving over to open-source solutions. How can the transition be made successfully, and what are the risks to consider?
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
From the fridge to TV, how we’ll embrace the year of the virtual assistant in 2023 Decades ago, futurologists and TV shows such as ‘The Jetsons’ envisaged homes filled with
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
In recent years, small businesses have increasingly become the target of man-in-the-middle cyberattacks. Protect yourself by using a VPN.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.