Email extortion: how scammers use blackmail
You’ve received a threatening email. What’s your next move?
You’ve received a threatening email. What’s your next move?
Researchers have discovered that 50% of data transmitted via satellites is unencrypted. This includes your mobile calls and texts, along with banking, military, government, and other sensitive information. How did this happen, and what can we do about it?
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
Two campaigns by the BlueNoroff APT group target developers and executives in the crypto industry.
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
The optical sensors in computer mice can be used for eavesdropping. We break down why this is fascinating — but still a long way from real-world practicality.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky