
Three ways to hack… a mattress!
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
How to counter new privacy invasions by browser developers
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
How to respond to a compromised GitHub changed-files Action incident.
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
Experts at Kaspersky have uncovered fake online stores scamming Maha Kumbh Mela 2025 devotees with fraudulent holy merchandise. Here’s how you can stay safe and protect yourself from online scams.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.