Phishing through e-mail marketing services
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
3201 articles
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
These handy tools make watching shows on Netflix even easier and safer.
Jeff and Dave discuss a so-called Robin Hood ransomware gang, a change in PlayStation’s abuse reports, and more.
Security training aimed at IT teams, service desks, and other technically advanced staff.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Jeff and Dave discuss COVID-related scams in the UK, a Massachusetts school system hit with ransomware, and more.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Cybercriminals are using steganography to hide their code and seek industrial data.
Jeff and Dave chat about the MosaicRegressor UEFI bootkit, a Grindr copy-paste hack, and more.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Is your child not yet 13 years old? We explain how to create a Google child account for him or her.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.
Jeff and Dave talk about US election worries, Google coming under fire for children’s privacy, another hospital hit by ransomware, plus much more.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
The Kaspersky Next event looked at human augmentation, Cerberus and hospital hackers
As soon as Facebook announced grants for coronavirus-hit businesses, scammers went phishing.