MSP market changes in post-pandemic world
Two studies of the MSP and MSSP market development in the context of ubiquitous remote work.
Two studies of the MSP and MSSP market development in the context of ubiquitous remote work.
How to set app permissions in iOS 15 for maximum privacy and security.
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
We analyze some typical examples of phishing bait for movie streamers.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Free yourself from social media and start living again.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Here’s how to open a program if your antivirus app blocks it.
If your antivirus stops you from going to a website, don’t disable it, create exclusions.