How (not) to play tanks and catch a backdoor
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
3883 articles
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
Rules for detecting atypical behavior in container infrastructure at the data collection stage, and other updates to our SIEM system.
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
Many of us have dozens of online subscriptions and recurring payments. How to take control, save money, and stay on top of expenses?
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
We share our experience on the optimal use of AI models in the SOC of our Kaspersky MDR service.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
AI has dozens of applications in cybersecurity. Which ones are the most effective?
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
What to do if you receive a text with a two-factor authentication code from a service you’ve never registered for.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.