If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Jeff and Dave discuss COVID-related scams in the UK, a Massachusetts school system hit with ransomware, and more.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Cybercriminals are using steganography to hide their code and seek industrial data.
Jeff and Dave chat about the MosaicRegressor UEFI bootkit, a Grindr copy-paste hack, and more.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
When it comes to information security, we’re seeing the same mistakes over and over again.
Two schemes whereby a victim receives money — and neither one is good news.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
We explain how to hide private data in images properly, without making rookie mistakes.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Your online finances need proper protection. Learn how to secure your PayPal account.
Five things that, if neglected, can cost SMBs dearly.