Chrome in the zero-day crosshairs
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
3884 articles
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Basically, all apps collect some information about you. Using the services AppCensus and Exodus, you can find out what exactly is collected.
Dave and Jeff chat about the week’s top cybersecurity news, including whether you should put your license plates online, FTC crackdowns on stalkerware, Aussie cops making bank on Bitcoin, and more.
A pixel-art infographic with 30 years of information security developments, from the Cascade virus to the most recent days.
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
On this podcast, Dave and Jeff take a look at the week’s top cybersecurity news including voice apps turning home assistants into phishing devices, Pixel’s face unlock issue, the Air Force retiring some old tech, and more.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
Buzzing the White House, paralyzing airports, crashing into planes and power lines — we highlight the dangers of drones.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
This year’s Kaspersky NEXT event centred around AI, gender equality, and social robotics.
On this podcast, Dave and Jeff take a look at the latest on Libra, disclosing to guests if you have a smart speaker, jackpotting ATMs, and more.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
For this episode, Jeff flies solo while Dave is on vacation. Listen for the latest in Twitter’s Tailored Audience snafu, the US, UK, and Australia looking for encryption backdoors, and more.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
Here’s why when trying to download Kaspersky Free antivirus you get Kaspersky Security Cloud Free (and why that’s good news).
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.