Crypto, really. Part II: non-fungible tokens
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
How things are privacy-wise on the social network Poparazzi.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
On Identity Management Day 2022, see what you can do to protect your digital identity.