Security Analyst Summit 2023: key research
Four major studies presented by our experts at the SAS 2023 international conference.
Four major studies presented by our experts at the SAS 2023 international conference.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We take an in-depth look at securing and configuring containerization systems.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.