How to choose a truly free smartphone game
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
3275 articles
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Cybercriminals are using steganography to hide their code and seek industrial data.
Jeff and Dave chat about the MosaicRegressor UEFI bootkit, a Grindr copy-paste hack, and more.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
Jeff and Dave talk about US election worries, Google coming under fire for children’s privacy, another hospital hit by ransomware, plus much more.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
As soon as Facebook announced grants for coronavirus-hit businesses, scammers went phishing.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
On this episode of the Kaspersky podcast, Jeff and Dave take a look at the film The Social Dilemma, Facebook’s standoff with Ireland, and more.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
How the digitization of schooling is affecting parents and educators during the COVID-19 global pandemic.
By training your kids’ social media feeds, you can fill them with educational content.
You’ve locked down your home network. Now what?
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.