Ransomware on mobile devices: knock-knock-block
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
666 articles
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Security should be multilayered, and use of allowlists is appropriate as one of the security levels.
A recent story suggests Google is secretly recording your conversations and discussions. Are they really doing that?
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Hospital pays ransomware ransom, does not get files back.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Kaspersky Lab’s GReAT expert Ryan Naraine offers tips to avoid falling victim to ransomware.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Kaspersky Lab strives for efficient protection and to regularly improve our technology. One of the recent changes affected Kaspersky Security for Virtualization | Light Agent, our security solution for virtual environments. Now it supports one more virtualization platform – Kernel-based Virtual Machine (KVM).
How you can prevent Ransomware on your file share with Kaspersky Lab enterprise solutions.
Cryptolocker was bad, CTB-Locker was even worse, and new Petya ransomware is a freaking disaster.
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
Successful malware writers quickly figured that offering their creations to ‘people-with-a-purpose’ could be very profitable. Yet offering a service proved even more lucrative.
The majority of targeted attacks hitting businesses nowadays are conducted with cyberespionage in mind, harvesting precious business secrets or confidential personal data. But from time to time attackers get up to something completely different – like sabotage.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?