News and updates
Common spear-phishing tricks
Virtually every employee of a large company comes across the occasional e-mail aiming to steal their corporate credentials. It’s usually in the form of mass phishing, an attack in which e-mails are sent out at random in the hope that at least some recipients will take the bait. However, the stream of phishing e-mails may
How GDPR changed the world, and privacy regulation’s future
One piece of regulation has never before had such global impact as the EU Global Data Protection Regulation (GDPR.) It’s firmly established data privacy in the public mind, giving extensive and unassailable rights and affecting behavior well beyond the EU’s borders. GDPR legislation was a pioneer that other regions followed. The California Consumer Privacy Act (CCPA)
A focus on greater transparency and accountability
With information technologies inseparable from modern society, the importance of cybersecurity is growing, and therefore, trust has never been more important. Clients and partners of companies working in the field of information security need to understand who is involved in protecting their confidential data, what information they are sharing with whom, their guiding principles, and
6 antiphishing tips
What do e-mails with headings “You’ve won a million dollars” and “Your account is blocked” have in common? They’re almost always signs of a scam. Their aim is to convince the recipient to follow a link to a phishing website and enter confidential information: login and password or bank account details. Here’s how to spot
Remote dating: How do the apps safeguard our data?
The pandemic and the restrictions that came with it have led to an increase in the popularity of dating apps. For example, the total number of swipes on Tinder increased by 11% last year, with the daily number of swipes surpassing the 3 billion mark for the first time as early as March 2020. This is hardly
Why people fall for social engineering and how business can stop it
A security system is only as strong as its weakest link. And when it comes to cyberfraud, the weakest link is all around you: People. The easiest way for a fraudster to get what they want is to manipulate someone into giving it to them. For example, using a ruse to convince someone to give
Do cybercriminals play cyber games in quarantine? A look one year later
Last year, we decided to take a look at how the pandemic influenced the gaming industry and what new threats gamers could be facing. What we found was that, with the transition to remote work and remote learning, the number of blocked attempts to visit malicious game-related websites or follow malicious links from legitimate game-related
RIP, CAPTCHA
In a panel discussion at RSA Conference 2021 about Web attacks and online fraud, researchers discussed lessons drawn from studies of cybercriminal tactics and attacks on large organizations. One speaker, former law enforcement officer Dan Woods, talked about his experience training as a CAPTCHA farm worker. The work was copious and the pay meager (about $3
Phishing returns to its roots
Between tech support requesting access to your computer, concerned tax services specialists demanding payments, medical equipment suppliers “returning your call,” and many more — none legitimate — it’s a wonder anyone even answers their phone anymore. You’d be hard-pressed to find someone who hasn’t experienced some form of phone scam, although the name for it
Breaking the money mule’s back
In any bank fraud scheme, the criminals need to move funds to clean accounts or cash them out, and that means laundering. To cover their tracks, they transfer funds, first to money mules and thence somewhere else. At RSA Conference 2021, representatives of several major US and Australian financial institutions held a panel discussion on the topic of money mules and
Kaspersky Fraud Prevention and Indacoin Limited celebrate a year of successful cooperation
One year ago, a unique project Kaspersky Fraud Prevention became an important element of the security system of one of the pioneers in the field of a fiat-to-crypto exchange, which provides an opportunity to purchase cryptocurrency with Visa&Mastercard bank cards Indacoin Limited. After integration of the technology, the efficiency of the Indacoin Limited security system
COVID-19 vaccines in darknet marketplaces
In December of 2020, the US FDA approved the Pfizer vaccine against COVID-19. Within 24 hours, one of the largest global vaccination campaigns in history kicked off, with countries around the world rushing to begin the end of the pandemic. Unfortunately, supply chains haven’t been able to keep up, and poorly designed vaccination programs have resulted in long delays. And,
Who’s in your Facebook and Instagram accounts?
A notification pops up on your smartphone screen: “We detected an unusual login attempt from Rio de Janeiro, Brazil.” Whether the login attempt occurs where you live, halfway around the world, on the kind of phone you use, or from a device you’ve never heard of, what’s really going on here is an attempt to
Share of account takeover incidents increased by 20 percentage points compared to 2019
According to anonymized statistics of events detected by Kaspersky Fraud Prevention from January to December 2020, the share of such incidents increased from 34% in 2019 to 54% in 2020. Two schemes to get access to a bank account – ‘the rescuer’ and ‘the investor’ – remain among the most common since 2019. The importance
Fake copyright violation notice aimed at stealing Facebook accounts
The latest phishing campaign aimed at stealing Facebook accounts is gathering momentum. Users are receiving mass e-mails threatening bans for copyright violation. The aim is to steal the users’ login credentials. We explain the anatomy of the new scheme and how not to swallow the bait. Who, me? The message says something like: “Your Facebook
Request
a demo
We are sure there is nothing better than solving the real-world issues. Get in touch with us.