The cybersecurity of Star Wars: The Rise of Skywalker
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
127 articles
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
What cyberimmunity means in practice and in the industrial infrastructure environment.
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Cheats for multiplayer games are tantamount to malware, and their use in competitions to cybercrime.
Collaboration tools can become a vector for malware propagation.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
Three real-world examples to illustrate the dangers of digital clutter.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
Our new partner program: What customers should know about Kaspersky United.