Don’t believe your ears: voice deepfakes
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
3893 articles
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
This episode of the Kaspersky podcast includes discussion surrounding Microsoft data breach (or is it?), Google’s Chrome update and Twitter confusion continues.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Episode 305 includes knock-off Mario malware, is AI gunning for your job? and more
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Episode 304 kicks off with more worries around CLOP gang, Apple’s big fight against Apples and does AI need more regulation?
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
What two-factor authentication types are out there, and which ones should be preferred.
Episode 303 kicks off in sunny Dubai with discussions around crypto, ChatGPT, DoubleFinger and more!
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
A few tips on how to establish cybersecurity communications with employees.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.