Turnkey phishing
A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
148 articles
A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
We’ve released a free application that allows you to scan Linux systems for known cyberthreats.
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
On World Password Day, we explain how we protect your sensitive data, and share tips for creating truly strong passwords.
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
In 2023, our products and solutions took part in precisely 100 independent studies — winning 93 times: our best year ever.
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
AV-Comparatives has named our new Kaspersky Standard as Product of the Year. This is the highest honor conferred by this renowned independent lab specializing in testing security solutions.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Ready, set, tech: preparing for your kids’ first device.