
Uncle Sam compensates you for data leaks (yeah, right)
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
930 articles
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
On this podcast, Dave and Jeff address a ransomware attack in New Orleans, Facebook data stolen from a car, favorite Christmas movies, and more.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
Two schemes whereby a victim receives money — and neither one is good news.
How to protect your Instagram account and personal photos from prying eyes.
Thanks to independent security researchers, we’ve fixed several security issues, protecting customers automatically.
While surfing through Black Friday super deals, can you spot a real one from a dupe?
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
On this podcast, Dave and Jeff take a look at the week’s top cybersecurity news including voice apps turning home assistants into phishing devices, Pixel’s face unlock issue, the Air Force retiring some old tech, and more.
Here’s why when trying to download Kaspersky Free antivirus you get Kaspersky Security Cloud Free (and why that’s good news).
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.