Google forcing Android System SafetyCore on users to scan for nudes
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
454 articles
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
We’ve added technology that checks QR codes in emails for phishing links.
We discovered over 200 repositories with fake projects on GitHub. Using them, attackers distribute stealers, clippers, and backdoors.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.
Our developments, products, research, patents and expert teams harnessed for AI.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.