The Сyberworld Survival Guide: Phishing
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
652 articles
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Phishing is a dangerous type of Internet fraud. It uses fake websites to swipe user logins, and passwords to hijack online accounts to steal money or spread spam and malware
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
Episode 346 of the Kaspersky Podcast takes a look at North Korean propaganda sweeping TikTok, Nudify app and more.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Episode 342 of the Kaspersky podcast focuses on politics, AI meddling, YouTube and a governmental honey trap.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.