Who to trust: Different types of SSL certificates
We explain what digital certificates are, what types exist, and what problems are associated with them.
534 articles
We explain what digital certificates are, what types exist, and what problems are associated with them.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
Harmless toy or a way to phish for personal data?
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.
Our infographics will help you find the security solution that suits you best.
Simple passwords are easy to crack, complex ones hard to remember. Using one strong password for all logins isn’t safe. What’s the solution?
People put a lot of time, effort, and money into the online games they love. And yet many of them don’t bother to protect their gaming accounts properly.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.