Spam, phishing, and malware are still a big issue for cloud e-mail users
Beta-test program results confirm that e-mail administrators should think twice before relying on basic built-in protection.
683 articles
Beta-test program results confirm that e-mail administrators should think twice before relying on basic built-in protection.
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
Sometimes even cybercriminals go fishing. They hunt for a special goldfish — our personal data. So, what can you do to protect yourself from phishing?
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Phishing is a dangerous type of Internet fraud. It uses fake websites to swipe user logins, and passwords to hijack online accounts to steal money or spread spam and malware
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
AI has dozens of applications in cybersecurity. Which ones are the most effective?
Why cybersecurity in education is critical, and how to protect schools from attacks.
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
We’ve discovered a new Trojan that’s very selective about its victims.