Cryptoscam giveaway: phishers go after seed phrases
We explain how scammers steal cryptowallets through phishing.
1391 articles
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
What to pay attention to as to minimize the outcome from cyberincidents in an industrial facility.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Our experts investigated the activity and studied tools of ransomware gang BlackCat.
What is stalkerware, how widespread is the problem, and what is the relationship between domestic and digital abuse.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
This week on the Kaspersky podcast, Ahmed, Dave and I discuss sexual content on Roblox, unlocking locked crypto wallets, Apple Air Tags and more.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Remembering 2021’s most interesting infosec events — in memes and tweets.