
Not everybody on the Internet is whom they seem to be
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
929 articles
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
Securelist just released a new cyberespionage campaign alert, code-named “Operation Daybreak.”
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.