Fake financial regulators
Scammers are sending e-mails under the guise of government agencies to coax personal data and money out of users.
773 articles
Scammers are sending e-mails under the guise of government agencies to coax personal data and money out of users.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
We explain how the NullMixer dropper can download numerous Trojans onto a device.
We explain how the Harly Trojan subscriber targets Android users.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
We review a major cryptocurrency theft using spyware inside a PDF.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
How cybercriminals extract bank card details pretending to be DHL.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Here’s how phishers extract phone numbers and credentials from users of Wise.