
777 articles
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Five dead simple tips to greatly improve your defenses against cybercriminals.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Episode 365 has chatbots, CAPTCHA, Trump and yet more GDPR woes!
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
Our developments, products, research, patents and expert teams harnessed for AI.