Protect your corporate computer from unauthorized physical access.
Jeff and Dave discuss Bitcoin value ($20K!), creepy Microsoft patents, yet another ransomware case, and more.
What do trading platform developers and operators need to keep in mind?
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Kaspersky was honored to take part in the 15th annual Internet Governance Forum.
Jeff and Dave discuss new gaming scams, shady doorbells, recent leaks and ransomware incidents, and more.
Some of the most commonly encountered Internet scams related to Amazon.
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Research seeks to understand key drivers of the future of work.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Your online finances need proper protection. Learn how to secure your PayPal account.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Our new VPN has a failsafe — if it can’t protect, you can’t connect.
Another reason not to share everything online.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.