Kaspersky Password Manager gets a new look
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
128 articles
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
We’ve discovered a new Trojan that’s very selective about its victims.
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
Vehicle makers sell the data collected by connected cars about their users’ driving habits to data brokers – who resell it to insurance companies.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?