Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
On this podcast, Dave and Jeff discuss the changes to Ring’s dashboard, the FBI seeking help unlocking an iPhone, Travelex hit with ransomware, and more.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Exploring front-running to capture the Gemini dollar’s antispam stake.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
We look at the ridiculous reasons behind four recent cryptohacks.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why doesn’t Kaspersky Lab have an antivirus app for iOS — and what are all those other Internet security suites for Apple mobile devices?
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
How to protect your Instagram account and personal photos from prying eyes.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
There’s no malware in the official Android store, right? We get to the bottom of this claim.