In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
How a threat-intelligence platform helps SOC analysts.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
SE Labs awarded Kaspersky EDR its highest rating in independent tests based on real world attacks.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
How to check for hidden cameras in a hotel room or rented apartment.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
How things are privacy-wise on the social network Poparazzi.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
We review a major cryptocurrency theft using spyware inside a PDF.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
How cybercriminals extract bank card details pretending to be DHL.