A complete guide to security and privacy settings for your Battle.net account.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
On November 12, Kaspersky’s Global Research and Analysis Team heads to Reddit for an Ask Me Anything forum.
Dave and Jeff talk about the Trump campaign website being hacked, a Woolworths hoax, and more.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
These handy tools make watching shows on Netflix even easier and safer.
Jeff and Dave discuss a so-called Robin Hood ransomware gang, a change in PlayStation’s abuse reports, and more.
Security training aimed at IT teams, service desks, and other technically advanced staﬀ.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Cybercriminals are using steganography to hide their code and seek industrial data.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Your online finances need proper protection. Learn how to secure your PayPal account.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Our new VPN has a failsafe — if it can’t protect, you can’t connect.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
You’ve locked down your home network. Now what?
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.