Never share verification codes
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
137 articles
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Jeff sits down with Thiago Marques and Santiago Pontiroli to discuss their talk at #TheSAS2018 on Prilex and the carding scene in Brazil.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Modern technology actually helps phone scammers — what you need to know to stay safe.
A few years ago, a criminal gang in India was making easy money off tech-illiterate people in Europe, Australia, and Great Britain. They did quite well until they encountered Kaspersky
New York City is one of those places that people from around the globe make a pilgrimage to see. During the holiday season, Radio City Music Hall and the tree
Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
April 15 is a day that lives in infamy in the hearts of Americans. Now this date is not significant for any holiday, but rather the day that the Tax
While identity theft is something that we all know is scary, people generally are more passive with protecting their digital identity. However recent trends of breaches and stolen personal data
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try