Hacking YouTube channels with stolen cookies
How scammers can hack your YouTube channel without knowing a password and second factor.
435 articles
How scammers can hack your YouTube channel without knowing a password and second factor.
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
The pros and cons of different approaches to deploying and maintaining information security systems.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
How scammers force website owners to add potentially dangerous links by threatening harsh consequences for copyright infringement.
Scammers are using social engineering to shake down newly onboarded employees.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
In recent years, small businesses have increasingly become the target of man-in-the-middle cyberattacks. Protect yourself by using a VPN.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
What to do if your secret messenger isn’t secret enough.
And more importantly — how to stop your passwords from being used by cybercriminals.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.