How (not) to play tanks and catch a backdoor
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
80 articles
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
We explain what a pig butchering scam is: how it works, why it’s dangerous, and how to protect yourself from it.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.