Google Location History is now stored offline… or maybe not
Google updates the Android Location History feature. Why the change, and how will this work in the future?
2889 articles
Google updates the Android Location History feature. Why the change, and how will this work in the future?
Episode 335 of the Transatlantic Cable podcast looks at AI, magicians, chatbot snafus and more!
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Apple has released a new encryption protocol – PQ3 – for iMessage, which provides post-quantum security for instant messaging.
Episode 334 of the Kaspersky podcast includes LockBit takedown, big tech to tackle misinformation, blue aliens and more!
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Online dating is great for those looking for love – but beware the risks!
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Episode 333 of the Kaspersky podcast looks at deepfake photo IDs, Taylor Swift, Valhiem Discord mayhem and Interpol busts.
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Episode 332 of the Kaspersky podcast has AI legal issues, Mozilla worries, live facial recognition and 23andMe data breach news
A vulnerability in the glibc library affects most major Linux distributions.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto