What to do if you lose your phone with an authenticator app
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
1391 articles
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a fake press release that led to a spike in Litecoin, a data breach at McDonald’s, and more.
This week on the Kaspersky podcast, Ahmed and Jeff discuss Apple’s decision to hold off on CSAM, Babuk’s source code being leaked, a fake Banksy NFT, and more.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Public Wi-Fi is handy, but it’s not always safe. We demystify cybercriminal techniques and teach you how to stay at least one step ahead.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
Why using a corporate mail account for personal matters is not a good idea
How young children can spend money on games, apps, and even YouTube, and what you can do to protect your wallet.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
In computer games, where does the money go — and what can you do about it?
Scammers are distributing malware and adware made to look like Windows 11.
Free office applications: OpenOffice, LibreOffice, iWork. Free cloud-based products, such as Google Docs, but with privacy settings. `, text: ` For working with documents, consider free office suites such as
Tips on security and productivity for those who work both from home and in an office.