Commercialization of phishing
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
900 articles
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
 
			
		Phishing is a dangerous type of Internet fraud that uses fake websites to swipe user logins and passwords to hijack their online accounts to steal money or spread spam and
 
			
		If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
 
			
		The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
 
			
		Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
 
			
		Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
 
			
		We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
 
			
		Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
 
			
		A step-by-step guide to deleting as much of your digital footprint as possible.
 
			
		Attackers pretending to be airlines or airports are sending out fake partnership offers.
 
			
		Using our Kaspersky Next product line as an example, we explain the practical differences between XDR Optimum and EDR Optimum.
 
			
		Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
 
			
		A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
 
			
		A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
 
			
		Unknown attackers have compromised several popular npm packages in a supply-chain attack.
 
			
		The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
 
			
		We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
 
			
		This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.
 
			
		Here’s what any responsible parent should do if their kid wants to be a blogger.
 
			
		Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.