
Kids and cybersecurity: what parents should be aware of in 2024
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
225 articles
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Examples of how QR codes in emails are used for phishing.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
How to protect a company’s reputation from illegal use of its name on the internet.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
APT discoveries, AI implications, Darknet wonders, and cyber immunity insights: CSW ’23 shaping the cybersecurity landscape of 2023.
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
We explain how attackers can steal your credentials and how you can prevent it.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Information security measures are far more effective when supported by top management. How to get this support?
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
ACCEPT AND CLOSE
Notifications