Many services allow you to share your subscription with family. Here’s how popular sites handle sharing.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?
It’s a new speedrunning world record — made with Kaspersky Internet Security working in the background.
On this episode of the podcast, Dave and Jeff talk about the recent Garmin hack, four years of No More Ransom, and encryption under fire in US.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Five things that, if neglected, can cost SMBs dearly.
A preview of Black Hat 2020 with Eugene Kaspersky, Kurt Baumgartner, and Costin Raiu.
You can design a digital comfort zone you won’t want to leave.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
We explain why you need to back up critical data, even if you trust your equipment 100%.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
Common cybercriminal tricks for hijacking Office 365 accounts.
An integrated approach arms even small companies with automated tools that repel complex attacks.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
Two schemes whereby a victim receives money — and neither one is good news.
Every gamer knows what Steam is and more than likely uses it. Steam accounts are also bought and sold for real money, which makes them very attractive to cybercriminals. We’ve already
In addition to its primary targets, ransomware has infected some unusual devices.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
How to protect your Instagram account and personal photos from prying eyes.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.