Still using Windows 7? Time to go to Windows 10 — or beef up protection.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Exploring front-running to capture the Gemini dollar’s antispam stake.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Two schemes whereby a victim receives money — and neither one is good news.
How to protect your Instagram account and personal photos from prying eyes.
Ten tips to make your private digital life really private.
Every gamer knows what Steam is and more than likely uses it. Steam accounts are also bought and sold for real money, which makes them very attractive to cybercriminals. We’ve already
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
What if you turn off Kaspersky Secure Connection but need it to automatically turn on again in dicey situations
Astrologers were fooling you all your life. Here is what real horoscope, based on science and machine learning, looks like.