Step-by-step recommendations for streamers to guard against doxing, bullying,...
For some, Twitch streaming brings fame and fortune. The platform’s genre diversity has long transcended the boundaries of video games: artists, athletes and even bicycle couriers have all found...
View ArticleZenbleed: hardware vulnerability in AMD CPUs | Kaspersky official blog
Tavis Ormandy, Google security researcher, has published details on a hardware vulnerability found in AMD CPUs. The vulnerability affects the Zen 2 series CPUs, first presented in 2019. Even though an...
View ArticleMeasures to protect data when an employee leaves
All large companies have formal processes for both onboarding and offboarding. These include granting access to corporate IT systems after hiring, and revoking said access during offboarding. In...
View ArticleSystem time jumps in Windows: possible cause | Kaspersky official blog
Every now and then, Windows 10 users and administrators wonder why the time on their systems suddenly jumps by several weeks, months or even years (either forward or backward). What could be the cause...
View ArticleBad password policies and how to avoid them | Kaspersky official blog
Despite all the changes that have occurred in the field of information security over recent decades, passwords still remain one of the most important elements of data protection. And when we talk about...
View ArticleReptar: a vulnerability in Intel processors | Kaspersky official blog
On November 14, Google released a bulletin reporting a serious vulnerability in a number of Intel processors — starting from the Ice Lake generation released in 2019. Potentially this vulnerability can...
View ArticleHow to stop, disable, and remove any Android apps — even system ones |...
Most smartphones have an average of around 80 installed apps, of which at least 30% are never used since most are forgotten about. But such “ballast” is harmful: there’s less free space on the device;...
View ArticleResolutions for a cybersecure 2024 | Kaspersky official blog
The rapid development of AI, international tensions, and the proliferation of “smart” technologies like the internet of things (IoT) make the upcoming year particularly challenging in terms of...
View ArticleWhy you should start the year with a digital cleanup | Kaspersky official blog
What’s one of the best ways to kick things off to ensure a positive, fruitful 2024? We suggest doing some spring winter cleaning in your digital world — as this will certainly help you spend this year...
View ArticleThe cybersecurity threats to kids that parents should be aware of in 2024 |...
In the era of modern technology, the age at which children are introduced to the digital world and technology is increasingly lower. This digital experience, however, can be marred by potential risks...
View ArticleCyberthreats to marketing | Kaspersky official blog
When it comes to attacks on businesses, the focus is usually on four aspects: finance, intellectual property, personal data, and IT infrastructure. However, we mustn’t forget that cybercriminals can...
View ArticleSecure AI usage both at home and at work | Kaspersky official blog
Last year’s explosive growth in AI applications, services, and plug-ins looks set to only accelerate. From office applications and image editors to integrated development environments (IDEs) such as...
View ArticleHow to run language models and other AI tools locally on your computer |...
Many people are already experimenting with generative neural networks and finding regular use for them, including at work. For example, ChatGPT and its analogs are regularly used by almost 60% of...
View ArticleToy robot security issues | Kaspersky official blog
Kaspersky experts recently studied the security of a popular toy robot model, finding major issues that allowed malicious actors to make a video call to any such robot, hijack the parental account, or,...
View ArticleGoFetch: Apple CPU encryption hack | Kaspersky official blog
In mid-March, researchers from several U.S. universities published a paper demonstrating a hardware vulnerability in Apple’s “M” series CPUs. These CPUs, based on the ARM architecture and designed by...
View Article
More Pages to Explore .....