
Received an email with a QR code? Watch out!
Examples of how QR codes in emails are used for phishing.
19 articles
Examples of how QR codes in emails are used for phishing.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Cybercriminals have adopted the marketing tool for information collection.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
This is a story of when security works, but it may also be the story of a new way to exploit the internet for dirty money: As you can easily
As the recent NSA leaks have revealed, our digital lives make it very difficult to maintain anonymity and protect our privacy — especially since we tend to make it especially
Gone are the days that your inbox is stuffed with alarmingly bizarre emails advertising the latest diet supplements and unbelievable tricks to get the lowest mortgage rates possible. But the
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study