Phishing tricks with Microsoft Office
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
112 articles
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Why the computers in human resources are especially vulnerable, and how to protect them.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.