A malicious website can infect my iPhone. Fact or fiction?
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
3884 articles
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
Jeff and Dave discuss the latest in the Steam Bug Bounty issue, T-Mobile putting a customer at risk, Xbox listening and more.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
Eugene Kaspersky explains how Kaspersky Sandbox uses virtual machines to thoroughly examine malware’s behavior.
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
Collaboration tools can become a vector for malware propagation.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
We explain what an SOC 2 audit is, why we passed it, and how it was performed.
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
Jeff and Dave discuss more cameras in Kings Cross, Twitter accidentally using personal data for ads without permission, Microsoft listening in on Skype, and more.
Faster, better, more secure – find out what else has changed in the 2020 versions of Kaspersky security solutions.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
Jeff and Dave discuss Five Eyes looking to weaken encryption, possible social media changes, Amazon Rings used for surveillance, and more.
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
We explain how malware steals passwords and other valuable data stored in the browser — and how to protect yourself.
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.