
541 articles
Advertising in voice assistants is coming soon. We examine how it will use personal data and what you can do about it.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Stress relating to technology and cybersecurity is an escalating issue we can’t escape.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
Harmless toy or a way to phish for personal data?
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.