
Spotting Fake Websites on April 1st (And Other Days)
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
929 articles
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
Internet companies are doing their best to protect users and bring them better security solutions. The same goes for Google, which recently announced that the Chrome browser will now be
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as
Major sporting events always attract the attention of cybercriminals, and there’s no reason to think the Brazil World Cup will be any different. With group stage matches kicking off in
Loyal Kaspersky Daily readers are already aware of the recent mobile security trends: the hottest topic among cybercriminals are mobile banking Trojans. When you do your banking on a smartphone,
Game of Expectations Kaspersky Lab’s experts detected phishing newsletters that were supposedly advertising the messenger service, WhatsApp, being released for PC. WhatsApp is an extremely popular messenger for mobile platforms,
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
The biggest annual event in the mobile industry, Mobile World Congress, started yesterday in sunny Barcelona. From the beginning, it has brought some amazing and unexpected news that will likely
With each passing year, the mobile malware landscape continues to evolve. It’s now driven by groups of criminals working to carry out large scale attacks and earn substantial profits. There
There is a lot of talk these days about cybercriminals growing shrewder. They are less interested in getting notoriety for crashing a number of websites or launching large-scale mail worm
The WhatsApp acquisition by Facebook made headlines yesterday because of the record sum paid by the social media giant for the messaging startup. That’s a whopping $19 billion for a
The Syrian Electronic Army (SEA) has struck again, this time attacking the account records of more than a million Forbes readers and contributors. A total of 1,071,963 users were affected
With the threat landscape changing, the methods of protecting corporate resource develop, too. However, the key principles stay the same: know your basic vectors of threats, minimize possible human factor
During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we
Valentine’s Day is a holiday that triggers a massive spree of spam. As the holiday approaches, mailboxes are packed with romantic ads of all sorts. “Anti-Spam will protect me from
PUNTA CANA–A hacking group likely backed by an unknown national government has been targeting government agencies, embassies, diplomatic offices and energy companies for more than five years in what Kaspersky
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“, dedicated to the current cybersecurity situation and main trends in this field. As
Tomorrow is Safer Internet Day. You must know you can make your own Internet experience a lot safer without big technology or tough measures. All it takes is just a
Online payments have remained one of the most vulnerable sections of the IT perimeter. Most banks and payment systems now have two-factor authentication. However, not all of them have instituted