We look at the ridiculous reasons behind four recent cryptohacks.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
Dave and Jeff take a look at insecurities in smart TVs, all things Amazon, TikTok censorship, and more.
Two schemes whereby a victim receives money — and neither one is good news.
We examine the workings of emotion-recognition technologies, their usefulness, and the privacy concerns they inspire.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
One explanation of phishing success lies in a known psychological effect.
On this podcast, Dave and Jeff discuss an insecure smartwatch for kids, Jack Dorsey hacker caught, Black Friday scams and security and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
A study that looks at evolving market dynamics and the impact of changing client relationships and expectations on the MSP industry.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
In this post we explain why digital clutter can cost you your job.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Ten tips to make your private digital life really private.
We have already told you about a number of hacker groups jackpotting money from ATMs. Now you can see it with your own eyes! Our experts shot four videos of ATM hack demos.
There is a position at Kaspersky Lab that exists that is officially named ‘content analyst’. To put it simply, the content analyst’s task is to create content filter databases, which
How to protect your Instagram account and personal photos from prying eyes.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
What if you turn off Kaspersky Secure Connection but need it to automatically turn on again in dicey situations