Cybercrime is focusing on accountants
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
833 articles
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
How do you explain the basic concepts of staying safe on the Internet to your kids? With a good book, of course!
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
In this episode, Dave and Jeff discuss Facebook’s battle with ad-blockers, NotPetya ransomware, Lenovo losing employees’ private data, and more.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
In this edition of the Kaspersky Lab podcast, we discuss a targeted cryptocurrency scam, Canadian weed database breached, bio chips, and the current state of spam and phishing.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Forgotten online resources can be used for extortion or phishing
Why doesn’t Kaspersky Lab have an antivirus app for iOS — and what are all those other Internet security suites for Apple mobile devices?
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
Instagram hacking has been on the rise lately. Here’s what you need to know to avoid losing your precious account.
Start protecting your network by stopping potential threats way before they can get too close — on the Internet gateway level.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.