![Lookalike attacks in phishing and BEC](https://webcf.waybackmachine.org/web/20230729165751/https://media.kasperskydaily.com/wp-content/uploads/sites/92/2023/07/28130935/lookalike-domains-in-bec-featured-900x592.jpg)
Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.