Your personal cybersecurity checklist for 2026
Eight digital New Year’s resolutions you absolutely need to keep.
984 articles
Eight digital New Year’s resolutions you absolutely need to keep.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.
Malicious actors have started utilizing a new variation of the ClickFix technique — named “FileFix”. We explain how it works, and how to defend your company against it.
You’ve received a threatening email. What’s your next move?
Kaspersky for Linux is now available to home users.
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
A step-by-step guide to deleting as much of your digital footprint as possible.
Attackers pretending to be airlines or airports are sending out fake partnership offers.
Low-hanging fruit for boosting corporate cyber-protection.
Running a small or medium-sized business today is like steering a boat across busy waters. The leadership team and decision makers focus on customers, employees, and keeping operations afloat. But
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.