As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Dave and Jeff discuss how to keep personal data safe while protesting, the kerfuffle around NHS coronavirus texts, and more.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
How we optimized our solution for ATM protection, and why.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Security-as-a-Service is the future of information security.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
Two schemes whereby a victim receives money — and neither one is good news.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How to protect your Instagram account and personal photos from prying eyes.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
There is a position at Kaspersky Lab that exists that is officially named ‘content analyst’. To put it simply, the content analyst’s task is to create content filter databases, which
Every gamer knows what Steam is and more than likely uses it. Steam accounts are also bought and sold for real money, which makes them very attractive to cybercriminals. We’ve already
Ten tips to make your private digital life really private.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
No PIN on your phone? Pickpockets will thank you for that.