Dangers of your brand’s doppelgangers
How to protect a company’s reputation from illegal use of its name on the internet.
How to protect a company’s reputation from illegal use of its name on the internet.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
A few words on why desktop applications based on the Electron framework should be approached with caution.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Why the Windows system time can suddenly change, and how to stop it from happening.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?