
Lessons from the Bybit hack: how to store crypto safely
Takeaways for regular crypto holders from the biggest crypto heist in history.
Takeaways for regular crypto holders from the biggest crypto heist in history.
We’ve added technology that checks QR codes in emails for phishing links.
Despite being digital natives, 70% of millennials rarely verify online identities – exposing themselves to risks. Discover how to build safer online habits with expert insights from Kaspersky.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Cybercriminals are blackmailing YouTube bloggers into posting malware links in their video descriptions.
What information does an MDR service need to protect a company from complex targeted attacks?
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?