Coronavirus phishing
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
3957 articles
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
On this podcast, Dave and Jeff talk shop on the latest security issues exposed in Ring, GDPR’s impact, corporate espionage, a surprise Microsoft update, and more.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
If you get worried when your child hangs out with friends for too long or fear they might be skipping classes, use Kaspersky Safe Kids.
On this podcast, Dave and Jeff discuss an unsecured support server from Microsoft, Mozilla banning malicious extensions, Tinder sharing big data, and more.
Do your children spend all their time on their computer or smartphone? Kaspersky Safe Kids can help.
Using simple tools such as lasers and music to trick voice assistants and motion sensors.
We present the greenest and safest wallpaper choices for all of your devices, plus the highly anticipated 2020 calendar.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
As we raise kids in the digital age, the rules are constantly changing. Parents need to find the new best practices to rear kids with our connected lives.
Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.