
Chatting offline: an overview of mesh messaging apps
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
691 articles
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
We look at how AI can help you plan your vacation — and what can go wrong.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
Attackers hijack Discord invite links and redirect victims to scam servers to install malware using the ClickFix technique.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
Funny hacks that became internet legends: talking traffic lights, a high-school Rickroll, robot vacuums on the rampage, a Lenovo defacement, and a Burger King hijack.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
This is your World Password Day reminder about how to create strong passwords and remember them.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
We explain where and how to view porn without risking the security of your devices or your wallet.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.