Phishing for Office 365 credentials in images
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
A fake Kaspersky Internet Security for Android app highlights the danger of installing apps from outside of official app stores.
In this week’s episode, we look at how the DarkSide gang was able to breach the Colonial pipeline, Apple updating AirTags because of stalker fears, and much more.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Our technologies detected targeted attacks involving a number of zero-day exploits.
Tired of never-ending notifications? Here is how to turn them off on Apple computers.
Scammers continue to target cryptoinvestors, this time by luring their victims with fake ICOs for “hype” coins.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
The crew expands and we discuss video, Bitcoin mining, SolarWinds, and more on this week’s edition of the Kaspersky podcast.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
No one is immune to smartphone theft, but you can make sure no thief will get even a byte of your important data.
How to stop your iPhone or iPad from distracting you with endless notifications.
How to reduce information overload without missing anything important on your Android devices.