How browser plugins can leak corporate secrets
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
410 articles
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Dave and Jeff discuss the latest trend in US cities paying the ransom, hacking the smart home, Cirque du Soleil app issues and more.
How some students are cheating their way to exam success with dark web diplomas and hacked grades.
In this episode of the Kaspersky podcast, Dave and Jeff discuss deepfakes at Facebook, telcos behaving badly, Alexa spying, and more.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
A new spam mailing threatens the reputations of small businesses websites.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Three real-world examples to illustrate the dangers of digital clutter.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.