Update iOS, there is a dangerous vulnerability in WebKit
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
3274 articles
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How to update Google Chrome right when you really need to, and what to do if you run into problems.
Methods of reasonable protection against potential freelancer related cyberthreats.
This week on the Kaspersky podcast, Ahmed, Dave and I discuss a bug in OpenSea, NFTs running 3rd party code, Apple taking on stalkers, Signal and more.
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
This week on the Kaspersky podcast, Ahmed, Dave and I discuss Beatlemania hitting the NFT world, fear in the ransomware ranks, Russia’s cryptocurrency ban and more.
Kaspersky have a new service that allows our threat intelligence customers to take down malicious and phishing sites.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss North Korea’s cryptocurrency “earnings,” REvil;s takedown, NFT scams, Dune, and more.
Our experts have discovered a malicious campaign targeting fintech companies.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
In this week’s episode, Dave, Jeff, and Ahmed chat about the Bitcoin nosedive, NFTs, USB sticks loaded with malware, and hacked FIFA accounts.
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.