What SIM swapping is, and why business should care
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
26 articles
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
We explain what a pig butchering scam is: how it works, why it’s dangerous, and how to protect yourself from it.
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
We review a major cryptocurrency theft using spyware inside a PDF.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Kaspersky Lab has patented technology enabling our software to detect man-in-the-middle (MitM) attacks, beloved of authors of financial malware.
It now appears the number of servers bought and sold via xDedic might have been underestimated; it’s likely many more IPs have been compromised by xDedic players.