
Turning purple: how visited links threaten your privacy
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
This is your World Password Day reminder about how to create strong passwords and remember them.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
Researchers have found a way to exploit a security mechanism in a popular machine-learning framework.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
Experts at Kaspersky have uncovered fake online stores scamming Maha Kumbh Mela 2025 devotees with fraudulent holy merchandise. Here’s how you can stay safe and protect yourself from online scams.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.