834 articles
Two schemes whereby a victim receives money — and neither one is good news.
How to protect your Instagram account and personal photos from prying eyes.
Thanks to independent security researchers, we’ve fixed several security issues, protecting customers automatically.
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
On this podcast, Dave and Jeff take a look at the week’s top cybersecurity news including voice apps turning home assistants into phishing devices, Pixel’s face unlock issue, the Air Force retiring some old tech, and more.
Here’s why when trying to download Kaspersky Free antivirus you get Kaspersky Security Cloud Free (and why that’s good news).
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Hacking security cameras through a smart light switch — and other interesting features of smart homes.
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.