Why you should NOT pay ransom to malware creators
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
1183 articles
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
ATMs will soon use fingerprint readers and iris sensors to identify customers. But is biometric authentication as secure as advertised?
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
Everything you need to know about mobile banking Trojans and how to fight them.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
What are older people doing online, and are they aware of the threats out there?
How criminals use fake Wi-Fi hotspots to steal data, and how you can use our solutions to protect yourself.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
What if you have to transmit sensitive data and the only connection is open Wi-Fi? We’ve got you covered.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
How Kaspersky Lab helped the Russian police catch the cybercriminals behind the Lurk banking Trojan and Angler exploit kit.
What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
DotA 2 forum breach leaks 2 million accounts, probably has consequences