
DeepSeek: configuring privacy and deploying a local version
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
209 articles
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
Our experts trained an ML model to detect attempts to use DLL hijacking, and integrated it into the Kaspersky SIEM system.
The Kaspersky for Android app can now detect malicious links in notifications from any app.
Here’s what any responsible parent should do if their kid wants to be a blogger.
We look at how AI can help you plan your vacation — and what can go wrong.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
The more jobs you juggle, the higher your exposure to personal cybersecurity risks — especially if you’re a Zoomer.
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
This marks the second time we’ve found a stealer Trojan in the App Store.
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
This is your World Password Day reminder about how to create strong passwords and remember them.
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.