
Everything you need to know about ransomware
FAQ about ransomware: types, origins, dangers, and how you can stay safe
454 articles
FAQ about ransomware: types, origins, dangers, and how you can stay safe
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
The emergence of robocars could mean the end of personal vehicles as we know them. Here’s how things may go down.
Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here’s what you should do.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
How do we pinpoint our location at sea nowadays, and how did ancient seafarers navigate the open seas before the common era and during colonization?
Locky and Petya ransomware strains took the world by storm when they shouldn’t be successful at all.
Reasons why you should pony up the money for your own Wi-Fi and stop stealing it from your neighbors.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
The Kaspersky Daily team checks if FindFace can really find users on a social media site with one image taken on the street and if it is possible to hide from it. Some interesting peculiarities detected!
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
As new technologies become increasingly pervasive, we are starting to reconsider our vision of many things. Kaspersky Lab CMO Alexander Erofeev contemplates the ways the Internet transforms our views on privacy.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?