Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
4002 articles
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
On this week’s episode of the Kaspersky podcast looks at the U.K ‘snooper’s charter’, Warcraft community trick A.I and more!
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Episode 308 of the Kaspersky podcast looks at artificial intelligence, the FTC, Eurostar facial recognition and more.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
This episode of the Kaspersky podcast looks at news around social media and end-to-end encryption concerns as well as the snoopers charter.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
This episode of the Kaspersky podcast includes discussion surrounding Microsoft data breach (or is it?), Google’s Chrome update and Twitter confusion continues.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Episode 305 includes knock-off Mario malware, is AI gunning for your job? and more