How to stay safe from ransomware with free protection against cryptors and free decryption tools.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
With more than 2.5 billion gamers around the world, it’s no wonder cheats, hacks, and game modifications have spawned a multimillion dollar industry.
Dave and Jeff take a look at the future of Ring’s doorbell cams and a smart city of tomorrow, Alexas that have eyes and can walk, registering drones, and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Dave and Jeff take a look at Bitcoin mining in Georgia, Fortnite bans, the latest on gaming cheats, and more.
A study that looks at evolving market dynamics and the impact of changing client relationships and expectations on the MSP industry.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Hacking security cameras through a smart light switch — and other interesting features of smart homes.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Faster, better, more secure – find out what else has changed in the 2020 versions of Kaspersky security solutions.
Why personal mobile devices used for work need to be secure.
FinSpy is spyware for Android, iOS, Windows, macOS, and Linux that is sold legally. What it can do and how to defend yourself.
Hacked SIM cards allow spying. We explain how and why.
We explain how to leave the social network while keeping some posts as a memento, even if you forgot your password and changed your phone number.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
Scammers prey on people’s kindness. We tell you how to distinguish them from those who are truly in need.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
When the apps on your phone don’t update automatically, and you can’t find the right setting, we tell you where to look.
In this post we explain why digital clutter can cost you your job.