
How to get ready for deepfake threats
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
26 articles
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
Scammers are using social engineering to shake down newly onboarded employees.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
We present four rules of safe trading for gamers who earn money from in-game trades.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
One explanation of phishing success lies in a known psychological effect.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
How to steal a million (OK, half a million), or what happened to the Boca Juniors
The winter sales season is the hottest time of the year for shoppers and financial phishers. Be careful!
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
Instagram hacking has been on the rise lately. Here’s what you need to know to avoid losing your precious account.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.