As Ice Bucket Challenge Goes Viral, Scams Follow
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
580 articles
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Some things we routinely do in the office are dangerous for careers as they pose significant risk to the company’s business. It’s equally relevant for CEO and intern alike, so watch out!
No one likes support helpline queues, and we have some tools to provide you with an answer to your question almost instantly.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Igor Soumenkov, a Kaspersky Lab contributor to the Ubisoft’s Watch Dogs script assessment, explains how close to real life the game world is.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
These young researchers will shape cyberworld in the next decade.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
A visitor to Ferrari plant may find some of our rules too restrictive. Absolutely no cameras allowed inside, and we will need your signature to confirm that you were informed
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
Bitly was compromised this week and is urging users to change passwords. Point-of-sale systems are poorly secured. And fixes from Microsoft on Patch Tuesday.