Drones armed with guns, chainsaws and vulnerabilities
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
123 articles
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Yet another ZeuS variant is threatening businesses.
What happens when real cyber experts head to TV to stop cybercrime?
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life
We take a look at what happened in cybersecurity throughout 2015.
The Russian Mafia is a long-standing media staple in the West, portrayed with many myths, but reality is possibly surpassing all of them.
Kaspersky Lab’s quarterly IT Threat Evolution report is in and so is Kaspersky DDoS Intelligence Report for Q3 2015. Let’s take a look into what happened this last quarter.
An FBI representative speaking at the 2015 Boston Cyber Security Summit gave a piece of advice on ransomware which the San Francisco Chronicle called “disquieting”: he said it’s recommended victims
A botnet behind Dridex, a sophisticated banking malware stealing credentials of online bank accounts worldwide, are down.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
A huge state-of-art building on 18 Napier Road in Singapore is nestled among the green created by local flora and tropical climate, almost like a spaceship. As written on the
Kaspersky Lab security expert Vitaly Kamluk answers our readers’ questions about DDoS and botnets counteractions.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
Cybercriminals go at great lengths to throw researchers off their scent, but just like in the “offline” crime world they make errors and leave peculiar traces behind, making them look a bit silly, while the cyber-forensic experts get happy.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
Ransomware is a common and much-feared problem. Here are ten facts to help in dealing with it.