MSI leak: tips for users, organizations, and developers
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
4002 articles
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
What multi-factor authentication is, why you should use it, and what “factors” there are.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
episode 300 kicks off with Meta’s record fine, ChatGPT and Neeva closure
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
Episode 299 looks at AI girlfriends, ChatGPT used for fake news and should face-filters be banned?
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Episode 298 of the Transatlantic Cable podcast brings us such delights as ChatGPT data breach, social media scams and much more!
Why such OSs are gaining more significance in markets in need of security.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
On this edition of the Kaspersky podcast, Ahmed and Jeff discuss AI from finding phishing to should we stop and under $200 will buy you a deepfake.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.