The perils of short links
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
965 articles
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
Detailed tips for those who want to make money from streaming without feeding the trolls.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Four threats you might face when using Airbnb, and tips for avoiding them.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
What two-factor authentication types are out there, and which ones should be preferred.
A few tips on how to establish cybersecurity communications with employees.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
How scammers can hack your YouTube channel without knowing a password and second factor.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
What multi-factor authentication is, why you should use it, and what “factors” there are.