When you get a login code for an account you don’t have
What to do if you receive a text with a two-factor authentication code from a service you’ve never registered for.
165 articles
What to do if you receive a text with a two-factor authentication code from a service you’ve never registered for.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
Why cybersecurity in education is critical, and how to protect schools from attacks.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
We’ve discovered a new Trojan that’s very selective about its victims.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.
Today we tell you about our practices for releasing new products, and also updating existing releases, which reduce the risk of large-scale incidents.
Kaspersky experts examined the security of public Wi-Fi hotspots in Paris on the eve of the Olympics.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
Independent cybersecurity lab AV-Comparatives put 15 anti-phishing solutions to the test — with only eight making the grade. We took home the gold, adding to our already extensive collection of accolades.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
The updated VPN & Antivirus by Kaspersky for iOS now supports Apple Shortcuts and Siri. We explain what you can do with this feature, and how to set it up.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
We’ve released a free application that allows you to scan Linux systems for known cyberthreats.