A Week in the News: Metadata, Zero Days, MH 370 Phishing and More
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
775 articles
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Phishing is a dangerous type of Internet fraud. It uses fake websites to swipe user logins, and passwords to hijack online accounts to steal money or spread spam and malware
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
Why do we have a love-hate relationship with dating apps, and what are they doing to our brains? Can an emoji start a war? Is marrying an AI actually a thing? We’re exploring how modern tech is redefining love and our very ideas of it.
We’re breaking down how to protect yourself from fake streams, counterfeit tickets, and non-existent merch — and how to keep your personal and financial data from being snatched during the 2026 Winter Olympic Games.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Eight digital New Year’s resolutions you absolutely need to keep.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.
Malicious actors have started utilizing a new variation of the ClickFix technique — named “FileFix”. We explain how it works, and how to defend your company against it.