How crooks use your doppelgangers to pay with your card
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
123 articles
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
WhatsApp and Facebook are swimming in links to ticket giveaways for fairs and airlines. Don’t get excited, though; the tickets are fake.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
Why you shouldn’t lose your head at the sight of huge discounts, and how to spot a scam online store.
How to protect the financial accounts of your clients without scaring them away.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Jeff sits down with Thiago Marques and Santiago Pontiroli to discuss their talk at #TheSAS2018 on Prilex and the carding scene in Brazil.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Modern technology actually helps phone scammers — what you need to know to stay safe.