Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
How a recently discovered bug in Intel processors threatens cloud providers.
A look at the pros and cons of updating Android — and ways to do it safely.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Four handy ways to lock your screen on Windows and macOS.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
Four major studies presented by our experts at the SAS 2023 international conference.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
We take an in-depth look at securing and configuring containerization systems.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Alternatives to Google Chrome that take data privacy more seriously.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
Some thoughts on what PC software patches should be prioritized and why.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.