We developed a sandbox capable of emulating a company-specific system in an isolated environment.
How to protect accounts on Steam, Origin, Epic Store, and other such services.
Common cybercriminal tricks for hijacking Office 365 accounts.
On this podcast, Dave and Jeff look at why Israel is using fish to fight hackers, why Google will pay for you to read news and how Facebook helped the FBI hack Tails OS.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Common attack schemes targeting SMB employees.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.
When it comes to antivirus protection, everybody would prefer a solution that works so well and so independently out of the box that they can forget about it until its
Kaspersky Free Antivirus provides reliable and, yes, free protection for Windows machines
In the context of the coronavirus pandemic, there is a growing need to protect collaborative software. We updated Kaspersky Security for Microsoft Office 365 and extended the free license period to six months.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Video streaming is gaining momentum among children, and here’s what might be wrong about it.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.