The Seven Young Goats and multifactor authentication
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
893 articles
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
A new scam aims to unlink a stolen iPhone from the victim’s Apple ID so it will fetch a higher price.
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
Take this quiz to find out if you are up to the task of defending your start-up from today’s ubiquitous cyberthreats.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Hacking security cameras through a smart light switch — and other interesting features of smart homes.
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
Dave and Jeff discuss the latest trend in US cities paying the ransom, hacking the smart home, Cirque du Soleil app issues and more.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
Cryptocurrency has rapidly become one of the most exciting technologies in recent years. The most popular of them all – Bitcoin – soared in value in 2017, leading to millions to purchase the currency and set up their own mining farms.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
Although the suspected leader of the FIN7 cybergang was arrested, malicious activity somehow persists.