
Watch the (verified) birdie, or new ways to recognize fakes
How to tell a real photo or video from a fake, and trace its provenance.
151 articles
How to tell a real photo or video from a fake, and trace its provenance.
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
We explain what a pig butchering scam is: how it works, why it’s dangerous, and how to protect yourself from it.
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Cybersecurity trends to consider and new threats to protect against in 2024.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
How cybercriminals force victims to work for them with offers of easy money.
Four threats you might face when using Airbnb, and tips for avoiding them.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
How scammers can hack your YouTube channel without knowing a password and second factor.