
Learn how to spot travel phishing
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
236 articles
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
The hidden dangers of out-of-office messages.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
Using only publicly available sources, how much can you find out about someone?
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
The winter sales season is the hottest time of the year for shoppers and financial phishers. Be careful!
In this edition of the Kaspersky Lab podcast, we discuss ways you can stay safe shopping online during Black Friday and Cyber Monday.
In this edition of the Kaspersky Lab podcast, we discuss a targeted cryptocurrency scam, Canadian weed database breached, bio chips, and the current state of spam and phishing.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Forgotten online resources can be used for extortion or phishing
The 50th edition of the Kaspersky Lab podcast looks into the latest in Google tracking, spam, and hacking ATMs and police body cameras.
More than 400 manufacturing companies became phishing targets.