How PayPal users get scammed
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
281 articles
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Cybercriminals have adopted the marketing tool for information collection.
The DeathStalker group targets relatively small companies and their trade secrets.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
Your online finances need proper protection. Learn how to secure your PayPal account.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
One explanation of phishing success lies in a known psychological effect.