How cybercriminals launder money stolen from banks
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
3201 articles
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
On this episode of the Kaspersky podcast, Jeff and Dave take a look at the film The Social Dilemma, Facebook’s standoff with Ireland, and more.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
How the digitization of schooling is affecting parents and educators during the COVID-19 global pandemic.
By training your kids’ social media feeds, you can fill them with educational content.
You’ve locked down your home network. Now what?
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Human augmentation, once the preserve of science fiction is quickly entering normal life – how will this change us?
Jeff sits down with Povel Torudd and Alejandro Arango to discuss the new documentary from Tomorrow Unlocked, “From Kurils with Love.”
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Dave and Jeff discuss deepfakes, Russian troll farms, Amazon five-star fraud, privacy in children’s apps, and more.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
Modern computerized car require a secure-by-design platform. And that’s just what we’ve come up with.
On this episode of the podcast, Dave and Jeff discuss a new dating scam, Tesla stopping a cyberattack, macOS malware, a Slack bug, and more.