Making a better sandbox
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
2780 articles
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Why such OSs are gaining more significance in markets in need of security.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
Alternatives to Google Chrome that take data privacy more seriously.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
The pros and cons of different approaches to deploying and maintaining information security systems.
New features of the updated Kaspersky Antivirus & VPN app for Android.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Image-generating neural networks are already everywhere. What privacy risks do they pose?