Global outage due to Friday’s release of CrowdStrike
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
74 articles
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Four handy ways to lock your screen on Windows and macOS.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
Some thoughts on what PC software patches should be prioritized and why.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
The BlueNoroff APT group has adopted methods to bypass the Mark-of-the-Web mechanism