Business data safety: You can’t have too many backups
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
320 articles
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Dave and Jeff discuss the latest trend in US cities paying the ransom, hacking the smart home, Cirque du Soleil app issues and more.
How some students are cheating their way to exam success with dark web diplomas and hacked grades.
In this episode of the Kaspersky podcast, Dave and Jeff discuss deepfakes at Facebook, telcos behaving badly, Alexa spying, and more.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
What the Hoax verdict means, and why such software is becoming more of a problem.
A new spam mailing threatens the reputations of small businesses websites.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Three real-world examples to illustrate the dangers of digital clutter.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.