Charity on the Internet: How to identify scammers
Scammers prey on people’s kindness. We tell you how to distinguish them from those who are truly in need.
1073 articles
Scammers prey on people’s kindness. We tell you how to distinguish them from those who are truly in need.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
What the Hoax verdict means, and why such software is becoming more of a problem.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Eugene Kaspersky on why Kaspersky Lab became simply Kaspersky — and the plans behind that change.
A newly discovered vulnerability allows hackers to eavesdrop on WhatsApp users, read their chats, and install spyware just by calling them. Update the app now!
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
Mobile World Congress 2019 recapped: 5G, Internet of Things, ultrasonic fingerprint sensors, and artificial intelligence.