How cybercriminals disguise URLs
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
1070 articles
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
Cyberattacks most commonly rely on just a few common operating system components.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
Using only publicly available sources, how much can you find out about someone?
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
The finest minds of cybersecurity and business from Central Asia will engage in the battle to save the world on the 27th of April.
Criminals are stealing money from freelancers — by offering them a job.
Fraudsters portfolio updated: now they’ve learnt to steal money from banks directly. How did it happen?
Cybercriminals go at great lengths to throw researchers off their scent, but just like in the “offline” crime world they make errors and leave peculiar traces behind, making them look a bit silly, while the cyber-forensic experts get happy.
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
The Problem At present, even very small companies store information that could cause irreparable damage to their financial future if it fell into the wrong hands. An example of this
Cybercrime is a funny business. The common element in cybercrime operations is that attackers enjoy virtual anonymity and a low chance of detections. And like most kinds of thievery, it
Look at any one of the dozens of reports about cybercrime levels, and you’ll inevitably come away with the conclusion that online crime is getting worse by the day. And
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.