How a recently discovered bug in Intel processors threatens cloud providers.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Four handy ways to lock your screen on Windows and macOS.
Episode 323 of the Kaspersky podcast looks at BAYC, AI, CCTV concerns & what does AI and Perfect Dark have in common?
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
Meet the new Kaspersky: We introduce our new product line and tell you about the improvements our home users can expect.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
Targeted attack on our management with the Triangulation Trojan.
Kaspersky and Nexway team up to create a transparent and open e-commerce platform for security and privacy products.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
Some thoughts on what PC software patches should be prioritized and why.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.