
USA and Canada release joint advisory against ransomware
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
653 articles
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
As new technologies become increasingly pervasive, we are starting to reconsider our vision of many things. Kaspersky Lab CMO Alexander Erofeev contemplates the ways the Internet transforms our views on privacy.
Manufacturers need to change their mindset when it comes to the IoT
Triada is a complex, stealthy, and professionally written malware suite. While it is mostly a consumer-level threat, Triada is also potentially dangerous to mobile apps-related businesses.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
A look at the evolution of mobile threats in 2015 and some predictions for 2016
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
How to resolve database update issues with your Kaspersky security solution.
Konstantin Goncharov recaps the most significant security events of 2015.
On the tracks of (relatively) recent research on the Brazilian cyberunderground comes news of a “re-ignited” banking malware which is using Facebook as a means of distribution. The threat itself
Public Wi-Fi networks provide Internet access and 100500 ways to you’re your data to cybercriminals. What can you do to protect yourself?
Kaspersky Lab’s Protected browser helps you make online transactions securely. It uses orange frame colors to tell users if something is wrong.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. We are posting funny pics of ourselves to amuse
In Back to the Future 2, Marty McFly and co. come to 2015. Let’s see, which forecasts of this legendary saga are true and which are false.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
What is the difference between real and theoretical threats?
Our vocabulary continues to evolve as we see slang enter our lexicon. From Googling to memes once-thought silly words have become accepted. This evolution is also impacting the way we write and punctuate statements online.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.