OSINT: what’s the danger, and how to stay safe
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Some thoughts on what PC software patches should be prioritized and why.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Explaining an issue in popular PC and server CPUs in simple terms.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Received an attractive job offer from a stranger? Be careful! It could be a scam…