
Messengers 101: safety and privacy advice
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Fending off ransomware attacks that exploit corporate IoT devices.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.