Might it be time to move over to XDR?
Using our Kaspersky Next product line as an example, we explain the practical differences between XDR Optimum and EDR Optimum.
685 articles
Using our Kaspersky Next product line as an example, we explain the practical differences between XDR Optimum and EDR Optimum.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Unknown attackers have compromised several popular npm packages in a supply-chain attack.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Takeaways for regular crypto holders from the biggest crypto heist in history.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Scareware is malware that scares users into doing something risky. Here’s how it works.
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.