Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
3225 articles
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
On this week’s episode of the Kaspersky podcast looks at the U.K ‘snooper’s charter’, Warcraft community trick A.I and more!
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Episode 308 of the Kaspersky podcast looks at artificial intelligence, the FTC, Eurostar facial recognition and more.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
This episode of the Kaspersky podcast looks at news around social media and end-to-end encryption concerns as well as the snoopers charter.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
This episode of the Kaspersky podcast includes discussion surrounding Microsoft data breach (or is it?), Google’s Chrome update and Twitter confusion continues.
SMBs and corporations are increasingly outsourcing certain IT responsibilities, though it is not usually a one-size-fits-all solution.
Celebrating the fifth anniversary of its Global Transparency Initiative, Kaspersky NEXT is back! Here’s a deep-dive into the highlights of this exciting cybersecurity conference.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.