Are Macs safe? Threats to macOS users
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
139 articles
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
What settings do you need to clear before getting rid of a gadget?
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?