“Buy Toncoin and invite your friends”: how scammers promise big earnings with cryptocurrency
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
101 articles
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
We explain what a pig butchering scam is: how it works, why it’s dangerous, and how to protect yourself from it.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Cybersecurity trends to consider and new threats to protect against in 2024.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
How cybercriminals force victims to work for them with offers of easy money.
Four threats you might face when using Airbnb, and tips for avoiding them.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
How scammers can hack your YouTube channel without knowing a password and second factor.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.