Little Red Riding Hood and the Wolf-in-the-Middle
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
242 articles
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
The hidden dangers of out-of-office messages.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
Using only publicly available sources, how much can you find out about someone?
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
The winter sales season is the hottest time of the year for shoppers and financial phishers. Be careful!