How “zero-clicks” work, and how to defend against them
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
635 articles
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Four handy ways to lock your screen on Windows and macOS.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
Four major studies presented by our experts at the SAS 2023 international conference.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
We take an in-depth look at securing and configuring containerization systems.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
How to choose a secure mobile platform for work.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
A few words on why desktop applications based on the Electron framework should be approached with caution.
How to protect a company’s reputation from illegal use of its name on the internet.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Why the Windows system time can suddenly change, and how to stop it from happening.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
Some thoughts on what PC software patches should be prioritized and why.