What to do if you lose your phone with an authenticator app
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
4003 articles
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a fake press release that led to a spike in Litecoin, a data breach at McDonald’s, and more.
Our first transparency report addresses requests from law enforcement agencies and government organizations worldwide.
If your antivirus stops you from going to a website, don’t disable it, create exclusions.
This week on the Kaspersky podcast, Ahmed and Jeff discuss Apple’s decision to hold off on CSAM, Babuk’s source code being leaked, a fake Banksy NFT, and more.
How installing unknown apps works in various versions of Android, and why you shouldn’t do it.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Malefactors are looking for vulnerable Confluence servers and exploiting CVE-2021-26084, an RCE vulnerability.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
The ethics of cybersecurity, from ethical disclosure to the hoarding of zero-day exploits, and more.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss the UK moving away from the GDPR, TikTokers doing good, changes coming to Apple and Google in-app purchases, and more.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
Guard against ransomers who encrypt your files and demand payment for their safe return.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss Tesla’s robots, Russian spy ships, PayPal and Bitcoin, and more.
We can expect to keep working from home for at least a few more months. You can still oversee your team effectively, even from miles away.