Are you OK with Facebook being a middleman between you and your bank?
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
128 articles
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
How to protect the financial accounts of your clients without scaring them away.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Jeff sits down with Thiago Marques and Santiago Pontiroli to discuss their talk at #TheSAS2018 on Prilex and the carding scene in Brazil.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Modern technology actually helps phone scammers — what you need to know to stay safe.
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
Find out if you can avoid traps set by fraudsters for Black Friday sales.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
The key danger is the method the Hummer uses to achieve its goals. It roots a device and gains administrator’s privileges to install unauthorized software of its own discretion
Criminals are stealing money from freelancers — by offering them a job.