You’ve been sent a “gift” — a Telegram Premium subscription
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
1402 articles
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Why cybersecurity in education is critical, and how to protect schools from attacks.
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
We’ve discovered a new Trojan that’s very selective about its victims.
An Office 365 security alert as bait in a phishing email.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.