
Snapchat caught in phishing campaign
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
231 articles
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
Kaspersky Lab discovered a new banking trojan called Asacub, which had evolved from a simple phishing program into a nearly ultimate threat.
Sometimes even cybercriminals go fishing. They hunt for a special goldfish — our personal data. So, what can you do to protect yourself from phishing?
Many would think that the root of all the cyber-evil is tech itself, and once you say no to fancy smart devices, all those spooky cyber-threats should go away. If
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
For a regular user like you and me it’s hard to imagine the path of online payments and the obstacles that appear on the way of one dollar — or just
“In God we trust, the rest we check” — A wise principle when discussing computer security, especially when using QR codes. The QR code has gained popularity in recent years
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.