
HR on guard for cybersecurity
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
234 articles
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Here’s how phishers extract phone numbers and credentials from users of Wise.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
Kaspersky have a new service that allows our threat intelligence customers to take down malicious and phishing sites.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
We analyze some typical examples of phishing bait for movie streamers.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.