Bugs beware!
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
426 articles
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
Harmless toy or a way to phish for personal data?
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.
Our infographics will help you find the security solution that suits you best.
Simple passwords are easy to crack, complex ones hard to remember. Using one strong password for all logins isn’t safe. What’s the solution?
People put a lot of time, effort, and money into the online games they love. And yet many of them don’t bother to protect their gaming accounts properly.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Kaspersky Free Antivirus provides reliable and, yes, free protection for Windows machines
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
A new study by Kaspersky Lab showed how insecure smart devices really are. We explain how to cope.
How to protect and control workloads in the AWS public cloud