The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
Files with the TXT extension are typically considered safe. Are they, though?
This week on the Kaspersky podcast, we discuss the state of financial cyberthreats.
Ransomware, once represented by screen blockers that were almost cute, has come of age.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
What’s the difference between the malware adapted for Apple’s new M1 chip and the sort written for good old x86 processors.
For this edition of the Kaspersky podcast, Dave and Jeff discuss extortionware, a dumb mafia member, data breaches, and more.
At home, whether you’re trying to work or to rest, noisy neighbors can be a real nuisance. Modern technologies can help.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
Seven safety and security rules to keep in mind when buying games and in-game items.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
A vulnerability in Google Chrome has already been exploited by malefactors. All users need to update to version 89.0.4389.90.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
How to resolve database update issues with your Kaspersky security solution.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
What if you turn off Kaspersky Secure Connection but need it to automatically turn on again in dicey situations
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
Ten tips to make your private digital life really private.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
What exactly do those age restrictions mean? Can a 10-year-old play a 12+ rated title?
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
Keep outsiders off your wireless network.
The hit app has had some security issues.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.