How young children can spend money on games, apps, and even YouTube, and what you can do to protect your wallet.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
The pandemic changed many things, but an increase in doxing was one that many people didn’t expect.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss the latest with Kaseya, making Bitcoin more trackable, and more.
In computer games, where does the money go — and what can you do about it?
How to remove browser ads in two clicks using our Anti-Banner feature.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
We explore the security settings of one of the most popular chat platforms on the planet.
The Geneva Dialogue discusses the program, where it stands, and what the future holds.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
Does isolating a network segment really guarantee its invulnerability?
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
How to protect your clients from cybercriminals impersonating your company on Twitter.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
It’s been a full year since the pandemic officially began. What have the new and challenging conditions taught us?
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
More confirmation that storytellers are infosec experts.
Tips on security and productivity for those who work both from home and in an office.
How scammers use voice calls for phishing.
If notifications are interrupting your work or play, turn them off.
Tired of never-ending notifications? Here is how to turn them off on Apple computers.