Google Play malware clocks up more than 600 million downloads in 2023
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
3273 articles
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
Exploring SBS ad opt-outs, emoji passwords, Meta’s ad-free subscription, and AI conversations on the latest in tech – Episode 322 of the Transatlantic Cable Podcast.
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Four major studies presented by our experts at the SAS 2023 international conference.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
Episode 321 looks at Okta, 1Password, Microsoft AI and Google IP blocking
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Episode 320 of the Kaspersky podcast dives into X, scammers, Android malware, Elon Musk (again) Cisco and much more!
Examples of how QR codes in emails are used for phishing.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We take an in-depth look at securing and configuring containerization systems.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.