Spam and Phishing in Q3: Dirty Summer Tricks
There are some interesting findings in our Q3 spam report.
563 articles
There are some interesting findings in our Q3 spam report.
The Internet is full of thoughts and perceptions, both true and false. Let’s investigate whether the Internet legend about hotel key cards storing guests’ personal information is fact or fiction.
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. We are posting funny pics of ourselves to amuse
What is the difference between real and theoretical threats?
Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life’s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
We received more accolades from AV-Comparatives in late August, and we would like to take a moment to share them.
Kaspersky Lab’s Q2 report on spam and phishing has arrived, and brought little surprises.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Kaspersky Lab experts have investigated a new series of attacks by the Darkhotel cybercriminal group. Here are the details.
Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.
Cybercriminals frequently use spam as the primary channel to spread malware. Of course, this is something we should take care of.
Mid-April in Singapore was pretty hot not only because of tropical climate, but also because of INTERPOL World – a huge conference/exhibition organized by INTERPOL to give security product vendors
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office.
Yet another Duke APT is hitting high-profile targets, including the US government office. This time it’s CozyDuke (also known as CozyBear, CozyCar or “Office Monkeys”, in honour of the video it employs as a decoy).
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
The cybersecurity has become the everyone’s business, and it raises the demand for continuous update of information for everybody, both high-level security professionals and common corporate users. And especially for the latter, since it is them criminals attack most of the time.
Phishing used to be an exotic threat, but that was years ago when malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard – especially
The story of how a biochip was implanted into my hand and why I needed it.