Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
On October’s Patch Tuesday, Microsoft patched 71 vulnerabilities, several of which are particularly serious.
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
How attackers are most apt to get into target companies’ infrastructure.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
Testing 11 advanced security solutions against the latest ransomware threats.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
Cyberattacks most commonly rely on just a few common operating system components.
A cybersecurity checklist for returning to the workplace.
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
Do ATMs employ a secret trick to call the police, and should you trust anything written in CAPS?
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
How to remove browser ads in two clicks using our Anti-Banner feature.
Tips on security and productivity for those who work both from home and in an office.
How scammers use voice calls for phishing.
If notifications are interrupting your work or play, turn them off.