Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
A look at the biggest ransomware attacks of 2023.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Online dating is great for those looking for love – but beware the risks!
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
A vulnerability in the glibc library affects most major Linux distributions.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
WhatsApp for Android can back up your chats to Google Drive. It’s free, but it may hurt older backups. Here’s how to get it right.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
Our new partner program: What customers should know about Kaspersky United.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
In this episode of the Kaspersky Lab podcast, Jeff and Ahmed take a look at the first day of the Security Analyst Summit in Singapore.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Cybersecurity trends to consider and new threats to protect against in 2024.
Four handy ways to lock your screen on Windows and macOS.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?