
Easy money pandemic: Welfare as bait
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
222 articles
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
One explanation of phishing success lies in a known psychological effect.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
ACCEPT AND CLOSE
Notifications