Higher Education and Cybersecurity
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
151 articles
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
AV-Comparatives has named our new Kaspersky Standard as Product of the Year. This is the highest honor conferred by this renowned independent lab specializing in testing security solutions.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Four major studies presented by our experts at the SAS 2023 international conference.
We take an in-depth look at securing and configuring containerization systems.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
How to protect a company’s reputation from illegal use of its name on the internet.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.