
Kaspersky Mobile Security: New Technology to Access Your Stolen Smartphone
Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
640 articles
Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
Updated: January 30, 2015 These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the
It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the mobile platform with a variety of malware
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
Hi, folks! For the last two weeks each and every fan of official Kaspersky Lab Facebook pages worldwide had the chance to ask our CEO, Eugene Kaspersky, anything at all
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
Ever wondered why kids these days spend so much time online? Most parents do. So we found out what they’re actually doing there (spoiler: nothing bad).
Kaspersky analyzed what modern children are interested in on the Internet.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
How to counter new privacy invasions by browser developers