What is “whaling”, and what’s the difference from phishing
Late in December, the term “whaling” mildly spiked in cybersecurity-related media outlets. The term isn’t exactly new, but it isn’t encountered as often as “phishing”.
3899 articles
Late in December, the term “whaling” mildly spiked in cybersecurity-related media outlets. The term isn’t exactly new, but it isn’t encountered as often as “phishing”.
At the Chaos Communications Congress, researchers explain how Dieselgate happened
Konstantin Goncharov recaps the most significant security events of 2015.
For the first 2016 Kaspersky Business blog post, we’ve chosen Commandments of Office Security, a handful of common problems with cybersecurity in the workplace, and the ways to solve – or at least mitigate – them.
Observing the evolution the good old SIM card went through and the results so far
Fix your cybersecurity problems with this 12-month resolution.
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
No electronic device, however reliable it may be is 100% fail-safe. In order to make sure your files are not lost due to some kind of failure, we recommend you to regularly backup your data with Kaspersky Total Security.
DDoS attacks are a formidable (and somewhat regular) problem for businesses, but occasionally they appear to be a threat for the entirety of Web. On Nov. 30 and Dec. 1,
Passwords are a sensitive subject for the majority of Internet users. Let’s clarify, what are the right and wrong ways to use passwords?
On the tracks of (relatively) recent research on the Brazilian cyberunderground comes news of a “re-ignited” banking malware which is using Facebook as a means of distribution. The threat itself
With Christmas less than a week away, it seems fitting that Hello Kitty is latest site geared at kids that has been hacked.
Joomla-based sites are being attacked using the zeroday vulnerability. According to the researchers who discovered the threat, this is an object injection flaw that allows a full remote command execution.
How to create strong passwords and keep them safe with Password Manager in Kaspersky Total Security Multi-device.
Did you know that your PC can become infected by an email that you never actually read?
An extremely troubling discovery had been made in Windows Outlook by Haifei Li, a security researcher currently employed by McAfee.
A system integrator discovered a virus lurking in a policeman’s body camera
We take a look at what happened in cybersecurity throughout 2015.
A renovated version of TeslaCrypt ransomware has recently affected numerous devices in Japan and Nordic countries.
Lack of cybersecurity knowledge can lead to the loss of money due to online banking fraud. Follow these eight rules to protect your money from cybercriminals
Nearly half of companies recently surveyed by Kaspersky Lab and B2B International think they know who to blame for DDoS attacks targeted at them. While it isn’t easy to prove, many think it is competitors orchestrating these attacks.