Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
We explain how cookies affect your privacy online.
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Remembering 2021’s most interesting infosec events — in memes and tweets.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Five signs you’re dealing with scammers.
A look at what’s changed in the Matrix in the 18 years since the last update.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
A cyberattack has affected an unexpectedly large number of industrial systems.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool.
Kaspersky opens its fifth Transparency Center, our first in North America, in Fredericton, New Brunswick, Canada.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
A practical guide for chief information security officers and security operation center managers.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Three ways to find a surveillance apps on your smartphone.
Do ATMs employ a secret trick to call the police, and should you trust anything written in CAPS?
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
No one is immune to smartphone theft, but you can make sure no thief will get even a byte of your important data.
Testing 11 advanced security solutions against the latest ransomware threats.
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
How to remove browser ads in two clicks using our Anti-Banner feature.
Tips on security and productivity for those who work both from home and in an office.
How scammers use voice calls for phishing.