
Authentication with one-time codes: pros and cons
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
28 articles
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
Many companies throw out information that can pose a security or reputational risk.
A server configuration oversight caused data from SuperVPN, GeckoVPN, and ChatVPN users to leak online. It’s now for sale on a hacker forum.
Jeff and Dave discuss new gaming scams, shady doorbells, recent leaks and ransomware incidents, and more.
Jeff and Dave discuss the Silk Road cash-out, a Trump site leaking voter details, ransomware at Compal, and more.
The abundance of work-related cloud tools and services calls for smart password handling.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
In this special edition of the Kaspersky Lab podcast, we discuss how parents should look at raising digital natives and the precautions they need to take.