What spam does Eugene Kaspersky get?
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
223 articles
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Common tax-related scams that fraudsters use to fool thousands of taxpayers each year and how to protect yourself from falling victim to them.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
One explanation of phishing success lies in a known psychological effect.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!