How to make Kaspersky Internet Security get along with Steam
We explain how to keep your computer running fast without sacrificing protection.
377 articles
We explain how to keep your computer running fast without sacrificing protection.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
On this podcast, Dave and Jeff talk with Rob Cataldo, chat about the latest with Zoom, report on nation-states spying on COVID-19 research, and more.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
When it comes to information security, we’re seeing the same mistakes over and over again.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.