A Week in the News: Metadata, Zero Days, MH 370 Phishing and More
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
785 articles
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Phishing is a dangerous type of Internet fraud. It uses fake websites to swipe user logins, and passwords to hijack online accounts to steal money or spread spam and malware
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
We’re diving into how the Be My Eyes app helps blind and low-vision users, checking if it’s actually effective at spotting cyberthreats, and sharing essential safety tips for the visually impaired community.
Kaspersky experts have detected fake websites that steal money from BTS fans during ticket pre sales. We explain how to stay vigilant and not fall victim to the scammers.
Telehealth services and apps are blowing up in popularity right now, making the availability of medical services better than ever. But just how safe is telemedicine, and what kind of risks does it carry?
How the AI boom and increasing reliance on open-source components are piling up corporate security debt — and what you can actually do about it.
Researcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents through isolation and security policies.
Spammers have figured out how to hide links to fraudulent sites within surveys created on legitimate platforms. We’re breaking down the ruse and sharing tips on how to avoid falling for it.
Threat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow automation.
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
Tired of hallucinations in AI overviews, and have no clue as to why or how Copilot suddenly appeared on your PC? Here’s a guide to switching off those intrusive AI features in popular services.
A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.
Why do we have a love-hate relationship with dating apps, and what are they doing to our brains? Can an emoji start a war? Is marrying an AI actually a thing? We’re exploring how modern tech is redefining love and our very ideas of it.
We’re breaking down how to protect yourself from fake streams, counterfeit tickets, and non-existent merch — and how to keep your personal and financial data from being snatched during the 2026 Winter Olympic Games.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.