How to get ready for deepfake threats
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
1074 articles
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
Hackers are distributing the QBot trojan through business correspondence.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
How scammers force website owners to add potentially dangerous links by threatening harsh consequences for copyright infringement.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
AI is going to have a tremendous impact on our lives. How can we get ready for it?
The metaverse, a virtual world where — as a digital avatar — you can visit places, shop for products, or subscribe to services, has become a media phenomenon in 2023. And while
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.