Hacking a powered-off iPhone: vulnerabilities never sleep
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Our experts studied the WinDealer malware created by the LuoYu APT group.
Here’s how phishers extract phone numbers and credentials from users of Wise.
Studying search queries popular with kids will help you start speaking your kid’s language.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
Meet Rosemarie Gonzales, Corporate Communications Manager at Kaspersky Southeast Asia.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
What should an incident response specialist be able to do and how can they improve their skills?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Free yourself from social media and start living again.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.