How to avoid becoming a money mule
This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.
39 articles
This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
What do trading platform developers and operators need to keep in mind?
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Why Steam users often fall victims to scams and frauds and how to avoid it.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
Our experts analyzed last year’s financial cyberthreats, and here is their report
One of our GReAT experts will share information on the techniques and operations implemented by cybercriminals in 2017 and how to counter them in 2018
Until very recently, news of blockchain was all around. Now that the hype has passed, let’s contemplate blockchain’s future.
How often do victims succeed in getting back money stolen by online scammers?
You can catch a Trojan even if you visit only legitimate websites. This post explains how it happens and what you should do to protect yourself.
Everything you need to know about mobile banking Trojans and how to fight them.
How criminals use fake Wi-Fi hotspots to steal data, and how you can use our solutions to protect yourself.
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!