
Google OAuth and phantom accounts
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
3278 articles
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Episode 330 of the Transatlantic Cable podcast looks at AI ‘sleeper agents’, eBay shenanigans and crypto-casinos
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Episode 329 of the Kaspersky podcast includes AI, Stuxnet and X accounts being flogged on the dark-web.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Cybersecurity trends to consider and new threats to protect against in 2024.
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
A serious vulnerability in UEFI firmware relevant to a large number of modern computers, and even servers.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
Episode 328 of the Kaspersky podcast includes historic EU A.I regulation deal, Evil ChatGPT? and even more A.I!
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Episode 327of the Kaspersky podcast looks at hackers targeting travellers, UK government stiffens adult content laws & an interview with Vidit Gujrathi, chess Grand Master on technology and chess.