Information security guide for new employees
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
3883 articles
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
This week on the podcast, Ahmed, Dave, and Jeff discuss the Ferocious Kitten APT, smiling to enter an office, and more.
How to protect your clients from cybercriminals impersonating your company on Twitter.
If notifications are interrupting your work or play, turn them off.
Many companies throw out information that can pose a security or reputational risk.
Dave, Jeff, and Ahmed talk WhatsApp, privacy, ransomware, and more on this week’s podcast.
Kaspersky Password Manager can do a lot more than just store your passwords.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
A fake Kaspersky Internet Security for Android app highlights the danger of installing apps from outside of official app stores.
In this week’s episode, we look at how the DarkSide gang was able to breach the Colonial pipeline, Apple updating AirTags because of stalker fears, and much more.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Our technologies detected targeted attacks involving a number of zero-day exploits.
Tired of never-ending notifications? Here is how to turn them off on Apple computers.
Scammers continue to target cryptoinvestors, this time by luring their victims with fake ICOs for “hype” coins.
Endpoint protection alone may not be strong enough to support the complex cyberthreats many businesses now face. Here’s how to decide on the solutions you need.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
The crew expands and we discuss video, Bitcoin mining, SolarWinds, and more on this week’s edition of the Kaspersky podcast.