Current status and updates regarding the implementation of our Global Transparency Initiative.
With more than 2.5 billion gamers around the world, it’s no wonder cheats, hacks, and game modifications have spawned a multimillion dollar industry.
Dave and Jeff take a look at the future of Ring’s doorbell cams and a smart city of tomorrow, Alexas that have eyes and can walk, registering drones, and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Dave and Jeff take a look at Bitcoin mining in Georgia, Fortnite bans, the latest on gaming cheats, and more.
A study that looks at evolving market dynamics and the impact of changing client relationships and expectations on the MSP industry.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Basically, all apps collect some information about you. Using the services AppCensus and Exodus, you can find out what exactly is collected.
Dave and Jeff chat about the week’s top cybersecurity news, including whether you should put your license plates online, FTC crackdowns on stalkerware, Aussie cops making bank on Bitcoin, and more.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
The infamous Lazarus group’s newest campaign is really hard to detect. Bonus: How cryptocurrencies, cybercriminals, and ramen noodles are connected.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
For the 100th edition of the Kaspersky podcast, Jeff and Dave discuss the hammer of GDPR coming down on British Airways and Marriott, and look back on some past stories.
Jeff and Dave discuss the latest hurdles for the Equifax breach settlement, Entercom being hit with ransomware, and more.
Jeff and Dave discuss the $5 billion fine for Facebook, Google Home listening ,and more.
Apple to roll out a system of its own for quick login to websites and apps. Learn what makes it different from similar offers.
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
When the apps on your phone don’t update automatically, and you can’t find the right setting, we tell you where to look.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
On this podcast, Dave and Jeff take a look at the week’s top cybersecurity news including voice apps turning home assistants into phishing devices, Pixel’s face unlock issue, the Air Force retiring some old tech, and more.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Did you know that the new features of Kaspersky Internet Security will protect you from the sneaky add-ons for freeware like adware, browser extensions and toolbars?