Update iOS and iPadOS to version 14.4 immediately
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
1219 articles
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
Computers don’t necessarily need a Wi-Fi module to transmit information over Wi-Fi, Israeli researchers have found.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
Why backing up is good but not enough when it comes to staying safe from ransomware.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
What do trading platform developers and operators need to keep in mind?
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Research seeks to understand key drivers of the future of work.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
Security training aimed at IT teams, service desks, and other technically advanced staff.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.