Ransomware bug leads to Petya decryptor
A bug in Petya ransomware has led to a decryptor that can help those impacted.
1147 articles
A bug in Petya ransomware has led to a decryptor that can help those impacted.
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
Public studies aren’t there for any kind of fear-mongering, however some cybersecurity-related news really may make one feel uneasy. That’s the case with the Kaspersky Lab’s Global Research & Analysis Team (GReAT) field study of the security of hospitals’ IT systems. As one may have already guessed, the situation there is, let’s say, not good.
A pirate app store that has tricked Apple and passed its code review is now stealing user’s credentials using FairPlay Man-in-the Middle attack.
As new technologies become increasingly pervasive, we are starting to reconsider our vision of many things. Kaspersky Lab CMO Alexander Erofeev contemplates the ways the Internet transforms our views on privacy.
Protect your browser and keep your passwords, card credentials and personal data safe with the help of Kaspersky Protection.
The vast majority of targeted attacks begin with simple steps; spear-phishing with malicious attachments or clickable links, or the infection of employees’ favorite websites (water-holing) to penetrate the security perimeter through the vulnerable browsers or other software. Don’t assume that because these methodologies are well-known, they are any less effective.
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Two-factor authentication involving SMS, while used by most banks for quite some time, is not unbeatable.
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
Summarizing the scary security trends coming out of the Mobile World Congress 2016 in Barcelona.
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.
Successful malware writers quickly figured that offering their creations to ‘people-with-a-purpose’ could be very profitable. Yet offering a service proved even more lucrative.