Recursive credential phishing for ESPs
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
116 articles
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
What multi-factor authentication is, why you should use it, and what “factors” there are.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Spam bots, GoDaddy hack, Twitter SMS 2FA and new research around kids’ attitudes to phishing – it’s the Transatlantic Cable!
More AI topics discussed this week, including AI-generated music and mugshots, the U.K. government banning encrypted phones & much more!
How authenticator apps work and what alternatives there are to Google Authenticator.
Kaspersky official blog Products for Family Security Solutions Premium protection Kaspersky Premium Complete protection for your devices, online privacy & identity Advanced protection Kaspersky Plus Combines security, performance & privacy
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up to you.