When you get a login code for an account you don’t have
What to do if you receive a text with a two-factor authentication code from a service you’ve never registered for.
3273 articles
What to do if you receive a text with a two-factor authentication code from a service you’ve never registered for.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
Episode 365 has chatbots, CAPTCHA, Trump and yet more GDPR woes!
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Why cybersecurity in education is critical, and how to protect schools from attacks.
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
Episode 364 has Tamagotchi’s, is TOR broken and crazy robot shenanigans!
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
We’ve discovered a new Trojan that’s very selective about its victims.
Our developments, products, research, patents and expert teams harnessed for AI.
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
Episode 363 has brain rot, stolen mobiles in China and streaming fraud!
An Office 365 security alert as bait in a phishing email.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Why and how to create a local backup of cloud data, taking Notion as an example.