Meet Rosemarie Gonzales, Corporate Communications Manager at Kaspersky Southeast Asia.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
What should an incident response specialist be able to do and how can they improve their skills?
The Department of Homeland Security is urging US federal agencies to “patch or remove” a list of VMware products within five days. Probably you should do it too.
Meet Ivan Kwiatkowski, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Our cryptanalysts have found a way to decrypt files encrypted by Yanluowang.
Our experts investigated the activity and studied tools of ransomware gang BlackCat.
Microsoft patches 128 vulnerabilities in a list of products, including Windows and its components.
Practical tips for protecting companies from ransomware.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
Ten tips to make your private digital life really private.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Working from home made everyone more vulnerable for online attacks and cybercriminals actively exploit it. Here are 3 reasons why Australia has become a target for ransomware.
How to remove browser ads in two clicks using our Anti-Banner feature.
Tips on security and productivity for those who work both from home and in an office.