How hidden mining threatens your business
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
111 articles
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Modern technology actually helps phone scammers — what you need to know to stay safe.
A few years ago, a criminal gang in India was making easy money off tech-illiterate people in Europe, Australia, and Great Britain. They did quite well until they encountered Kaspersky
New York City is one of those places that people from around the globe make a pilgrimage to see. During the holiday season, Radio City Music Hall and the tree
Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
April 15 is a day that lives in infamy in the hearts of Americans. Now this date is not significant for any holiday, but rather the day that the Tax
While identity theft is something that we all know is scary, people generally are more passive with protecting their digital identity. However recent trends of breaches and stolen personal data
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Hello there! Usually, I write about topics concerning technical support or problem-solving, but not this time – though it will be relevant to the cybersecurity world. Today’s post concerns phone fraud.
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never made.