Spies on wheels: how carmakers collect and then resell information
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
3199 articles
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We take an in-depth look at securing and configuring containerization systems.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
Episode 319 takes a look at Sony hit by CLOP, NATO data leak and 23andMe data leaked online
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
In this special edition of the Kaspersky Transatlantic Cable Podcast, we dive into the world of critical infrastructure with the Kaspersky ICS team.
Episode 318 of the Kaspersky podcast looks at NFTs, deepfakes, ICS reports and Sony hacks.
How to choose a secure mobile platform for work.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Episode 317 takes a look at TEMU scams, JPEX scams and an AI powered backpack
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Kids use social networks and IMs a lot, and don’t keep in mind that the “internet remembers all”. How to reduce the digital footprint of your tiny beloved ones (even if they’re taller than you).
A few words on why desktop applications based on the Electron framework should be approached with caution.
How to protect a company’s reputation from illegal use of its name on the internet.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.