Why ICO security is a must
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
454 articles
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Introduction Sharing personal and valuable information online has become essential in modern life. A decade ago, the majority of organizations were still prepared to interact with their customers through physical
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
The hidden dangers of out-of-office messages.
GandCrab still holds 40% of the ransomware market. Recent distribution methods help the malware stand out.
Antivirus for Android is a must. Here’s how to choose the best antivirus app, either paid or free, for your Android phone.
Adult websites are often seen as a security threat, but few know that Trojans could be after their porn site accounts.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
In this episode, Jeff and Dave discuss getting back at telesales, the latest from CES, the Town of Salem breach, and some disturbing data sales by US telcos.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
In this edition of the Kaspersky Lab podcast, we discuss a targeted cryptocurrency scam, Canadian weed database breached, bio chips, and the current state of spam and phishing.
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
It’s safe to assume the Internet knows a lot about you. But how can you find out what it is? Thanks to Privacy Audit, now it’s easy to do.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.