How to stop your iPhone or iPad from distracting you with endless notifications.
A ransomware attack forced Ireland’s healthcare service to shut down its servers. Here’s what we know so far.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Should you contact authorities about ransomware?
Dave and Jeff discuss the latest with the Colonial Pipeline ransomware as well as the latest trends in ransomware overall on this week’s Kaspersky podcast.
Headaches, dry eyes, a complaining lower back? Your work space might be to blame.
How to reduce information overload without missing anything important on your Android devices.
Phishers are using Google online services to take over Microsoft online service accounts.
This week on the Kaspersky podcast, we talk about cable-chewing beavers, Google’s issues with scam ads, and more.
We explain how to avoid getting burned by QR codes.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
The Galactic Empire’s heirs analyzed for cybersecurity.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
What happened with Trello wasn’t a traditional data leak — so, what happened?
The most active groups targeting companies, encrypting data, and demanding ransom.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Ten tips to make your private digital life really private.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
Keep outsiders off your wireless network.
The hit app has had some security issues.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.