
Lessons learned from the trojanized KeePass incident
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
Our experts at GReAT have uncovered a dangerous vulnerability in a smart-home control app that allowed attackers to disable physical security systems.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?