Safeguards against firmware signed with stolen MSI keys
What could be worse than a ransomware attack on your company? Only…
Review and analysis of fake Trezor cryptowallet
Easy to steal and cash out, сryptocurrency is one of the most…
Deepfake market analysis | Kaspersky official blog
Cybercrime quickly adopts new technologies. One of the most concerning trends is…
Microsoft buried Internet Explorer. But not completely — again
Not so long ago, the IT-security media space was once again full…
Purging your company’s LinkedIn page of fake employees
Among social networks, LinkedIn holds a rather unique position. The platform is…
Neural networks reveal the images used to train them
Your (neural) networks are leaking Researchers at universities in the U.S. and…
Update Google Chrome (and other Chromium-based browsers)
Another day – another browser vulnerability discovered! Indeed, the number of dangerous…
Urgent updates for iPhone — to iOS 16.4.1, and Mac — to macOS 13.3.1
No sooner had we written about vulnerabilities in both Apple and Microsoft…
Scam e-mails from “cloud-mining platform”
Despite some instability over the past six months, the cryptocurrency market is…