Dear YouTubers, phishers are after your accounts
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
86 articles
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Speaking of two-factor authentication — as we often do — did you know some convenient settings render it utterly useless? Let’s do it right.
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Fortnite for Android is not available on Google Play. We explain how to download and install it properly, and what else to do to stay safe.
Let us know which sounds make you feel safe and get a free copy of the exclusive vinyl.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss a vulnerability in Sonic the Hedgehog, a woman who has a habit of sneaking onto flights and more.
This week’s Transatlantic Cable podcast dishes on a hacked plastic surgeon, unsafe dating apps, new forms of 2FA, and more.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
How messages with confirmation codes from banks are intercepted and what can you do to protect yourself.
You could’ve asked our GReAT members whatever you wanted. Here are the best 6 questions and GReAT experts’ answers
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of