Our Blog
Home / Blog
How to analyze a suspicious e-mail
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how. Yaroslav AndreevOctober 22, 2021 The signs of phishing can be obvious — a mismatch between the sender’s address and that of their supposed company, logical...
How to download Windows 11 while avoiding malware
Scammers are distributing malware and adware made to look like Windows 11. Anton V. IvanovJuly 23, 2021 Microsoft hasn’t yet released Windows 11, but the new operating system is already available for download and preview. Cybercriminals, of course, are exploiting...
Five things to update ASAP
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks. Rest assured, there is no global conspiracy to bug you with update notifications. As you may have noticed, unpatched software enables a large proportion of cyberattacks,...
Kaspersky evaluates students performance during enforced distance learning
According to a Kaspersky recent survey “Digital education in Covid era”, more than half of children in the Middle East, Turkey and Africa region (67%) who switched to remote learning due to the pandemic prefer in-person education. Ahmed AbdelghaniOctober 19, 2021 Due...
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity? Cybersecurity in 007’s world
Cybersecurity in 007’s world What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity? Nikolay PankovOctober 29, 2021 The recently released No Time to Die lowers the curtain on the Daniel Craig era. With that in mind, let’s...