More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Some of the most commonly encountered Internet scams related to Amazon.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
Jeff and Dave discuss Amazon going after influencers hawking bootlegs goods, COVID-19 researchers under attack, and more.
Seven safety and security rules to keep in mind when buying games and in-game items.
Jeff’s favorite questions and answers from Kaspersky’s Global Research and Analysis Team’s recent Reddit AMA session.
Research seeks to understand key drivers of the future of work.
Jeff and Dave discuss the Silk Road cash-out, a Trump site leaking voter details, ransomware at Compal, and more.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
Security training aimed at IT teams, service desks, and other technically advanced staﬀ.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
When it comes to information security, we’re seeing the same mistakes over and over again.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
We explain how to hide private data in images properly, without making rookie mistakes.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
It’s believed, that we own GPS, Bluetooth, Wi-Fi and CDMA invention to Hedy Lamarr. Let’s find out if this is true and what exactly the actress contributed to the development of these technologies
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.