Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
On this episode of the Kaspersky podcast, Jeff and Dave take a look at the film The Social Dilemma, Facebook’s standoff with Ireland, and more.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
How the digitization of schooling is affecting parents and educators during the COVID-19 global pandemic.
By training your kids’ social media feeds, you can fill them with educational content.
You’ve locked down your home network. Now what?
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
Modern computerized car require a secure-by-design platform. And that’s just what we’ve come up with.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Two schemes whereby a victim receives money — and neither one is good news.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
In addition to its primary targets, ransomware has infected some unusual devices.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Your online finances need proper protection. Learn how to secure your PayPal account.
Five things that, if neglected, can cost SMBs dearly.
What you need to check regularly to keep your Android smartphone and your data safe and sound.