Should you disable Microsoft Recall in 2025?
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
1402 articles
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Fending off ransomware attacks that exploit corporate IoT devices.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
Takeaways for regular crypto holders from the biggest crypto heist in history.
Despite being digital natives, 70% of millennials rarely verify online identities – exposing themselves to risks. Discover how to build safer online habits with expert insights from Kaspersky.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.
We discovered over 200 repositories with fake projects on GitHub. Using them, attackers distribute stealers, clippers, and backdoors.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.