Watch the (verified) birdie, or new ways to recognize fakes
How to tell a real photo or video from a fake, and trace its provenance.
242 articles
How to tell a real photo or video from a fake, and trace its provenance.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Examples of how QR codes in emails are used for phishing.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
How to protect a company’s reputation from illegal use of its name on the internet.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?