How spammers use Google services
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
898 articles
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
Although the suspected leader of the FIN7 cybergang was arrested, malicious activity somehow persists.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
Cloud platforms bring benefits to business but also cybersecurity challenges and concerns. Read more about cloud security in the new Kaspersky Lab report
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
The source code of infamous, billion-dollar malware was found on VirusTotal. Here’s what we know about it and what to expect next.
Sorting Out Digital Clutter In Business Kaspersky Lab brings together digital workplace and personal habits to assess cyber risk Introduction Digital clutter at work is a very real problem… In
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
Do you use plugins on your website? Make sure they are updated regularly.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
Why Kaspersky Internet Security for Android and Safe Kids are set to lose some features.
To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The hidden dangers of out-of-office messages.