We look at the ridiculous reasons behind four recent cryptohacks.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
Dave and Jeff take a look at insecurities in smart TVs, all things Amazon, TikTok censorship, and more.
Two schemes whereby a victim receives money — and neither one is good news.
We examine the workings of emotion-recognition technologies, their usefulness, and the privacy concerns they inspire.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
One explanation of phishing success lies in a known psychological effect.
On this podcast, Dave and Jeff discuss an insecure smartwatch for kids, Jack Dorsey hacker caught, Black Friday scams and security and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
A study that looks at evolving market dynamics and the impact of changing client relationships and expectations on the MSP industry.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Eugene Kaspersky on why Kaspersky Lab became simply Kaspersky — and the plans behind that change.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
Why doesn’t Kaspersky Lab have an antivirus app for iOS — and what are all those other Internet security suites for Apple mobile devices?
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Scammers prey on people’s kindness. We tell you how to distinguish them from those who are truly in need.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.