
Fake LinkedIn notifications
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
716 articles
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a school using facial recognition for kids’ lunch payments, REvil being hacked again, more than $600 million in ransom payments, and more.
How attackers are most apt to get into target companies’ infrastructure.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a breach at T-Mobile, John Oliver’s rant on ransomware, garbage trucks finding Wi-Fi, and more.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
In computer games, where does the money go — and what can you do about it?
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.