How to defend against hijacking and trojanization of Chrome extensions
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
1391 articles
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
What IT and cybersecurity leaders need to know about implementing network detection and response.
Detection of tactics involving malicious DLL registration and other Kaspersky SIEM improvements in Q4 2024.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Why international standards are important, and how Kaspersky contributes to IoT standardization.