1183 articles
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Cybercriminals have realized that infecting servers is much more profitable than mining on home users’ computers.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
The APT actor shows interest in finances and biochemical threat prevention and research.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
How to avoid getting phished or otherwise duped on the eve of the 2018 World Cup in Russia.
How scammers are exploiting the GDPR fuss to extract personal data.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
A traditional approach to cybersecurity is no longer good enough. Dealing with advanced threats requires advanced tools such as endpoint detection and response.
Fake airline giveaways won’t win you a ticket, but they might steal your data.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
How to safeguard your solution and clients with time-tested technologies.
How Kaspersky Endpoint Security for Business counters the latest threats.
A cloud instrument for detailed malware activity analysis.