Breaking the money mule’s back
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
147 articles
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Should you contact authorities about ransomware?
The Galactic Empire’s heirs analyzed for cybersecurity.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
Why the computers in human resources are especially vulnerable, and how to protect them.
Cybercriminals made off with more than $16 million from ransomware from 2016 to 2017.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Security training aimed at IT teams, service desks, and other technically advanced staff.
A shared work environment can facilitate malware distribution. We have just the means to stop it.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.