How fraudsters bypass customer identity verification using deepfakes
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
32 articles
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
What do trading platform developers and operators need to keep in mind?
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
Our experts analyzed last year’s financial cyberthreats, and here is their report
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
People truly enjoy the perks of the digital era and tend to shop and pay online or via mobile banking. Research commissioned by Kaspersky Lab confirmed that the majority of users (81%)
If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do
1. Why do I need to read this? This article will help you to protect the money in your bank account. 2. Mobile banking Trojans — what are they? Every
Danger often comes from an unexpected direction. For example, while you are alert to pickpockets, criminals may be approaching invisibly, over Wi-Fi. Here’s a typical scenario: Let’s say you meet
What do you do when your e-mail filters fail and you get a bunch of spam letters? Most probably, you delete, delete, delete without even opening them. Of course, that’s
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
At the Mobile World Congress 2016 in Barcelona, Eugene Kaspersky and Sandra Alzetta of VISA held a roundtable conversation devoted to the financial security and other related questions. Of course,
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
At the SAS 2016, Kaspersky Lab’s GReAT team unveiled how dozens of banks lost millions of dollars via APT tools. We know that the blogs were a tad long so