Getting sick is doubly dangerous: Medical equipment is vulnerable to hackers
Hacked medical equipment can cost patients a lot — their health or even their lives.
1183 articles
Hacked medical equipment can cost patients a lot — their health or even their lives.
Kaspersky Lab has lately researched an active cybercriminal trading platform xDedic. The main purpose of the xDedic marketplace is to facilitate buying and selling credentials of more than 70,000 hacked servers from all around the world.
Kaspersky Lab sponsors and supports an archaeological excavation near the Akrotiri settlement in Greece, which can shed light on the history of the Minoan civilization.
Theoretically, every business should have already learned how to protect itself against ransomware. Actually it’s not the case.
ATMs and point-of-service systems are extremely vulnerable to malware — and software vendors are no longer patching them. Here’s how to make them safer.
Kaspersky Security Scan is a free diagnostic tool for those who don’t use antivirus software — or those who want to double-check their system.
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
A look at recent survey results on awareness of ransomware in North America.
All files encrypted with TeslaCrypt ransomware can now be decrypted … thanks to its creators
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
Gartner’s Magic Quadrant is a tool that helps to choose which vendor fits organizations best for a particular business purpose. It is designed for CIO’s, decision makers, and IT-security specialists of the businesses.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Securelist has released a new report on DDoS attacks in the first quarter of 2016.
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
Free Kaspersky Virus Removal Tool helps cleaning up PCs, which have no antivirus installed.
Remember the beginning of Terminator 2: The Judgement Day where John Connor is shown hacking an ATM with an Atari Portfolio?
Ransomware is mostly the end-user problem. However, businesses get hit too, and hit hard, especially the smaller ones.