Testing the mettle: legit tools for illicit cyberespionage
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
685 articles
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
We talk about ever-present connectivity. What does that mean for raising kids?
Users also want and expect access to data 24/7, with no barriers or lag times.
Kaspersky Lab has developed a new solution to provide industrial cybersecurity – Kaspersky Industrial CyberSecurity.
They say Facebook severely violates users’ privacy. Is it true and why European authorities claim that?
As new technologies become increasingly pervasive, we are starting to reconsider our vision of many things. Kaspersky Lab CMO Alexander Erofeev contemplates the ways the Internet transforms our views on privacy.
While the popular notion is that Macs are virus-proof, it is actually quite a myth. These computers can catch viruses and Ransomware.
Kaspersky Lab launches two new enterprise solutions for preventing the most sophisticated cyberthreats organizations encounter worldwide.
Targeted attacks are visibly commoditizing, choosing cost efficiency over sophistication. If a combination of social engineering, tweaks to widely-available malware and legit apps can do the trick, why bother to create something original and exquisite?
At The SAS 2016, Kaspersky Lab researchers discussed the newly discovered Poseidon Group. A custom APT boutique chasing commercially valuable data
Tax season means that more folks than the IRS are after your money.
We all know that security is low on the IoT totem pole. However, here’s to hoping these 5 items stay secure.
Late in December, the term “whaling” mildly spiked in cybersecurity-related media outlets. The term isn’t exactly new, but it isn’t encountered as often as “phishing”.
Konstantin Goncharov recaps the most significant security events of 2015.
Fix your cybersecurity problems with this 12-month resolution.
On the tracks of (relatively) recent research on the Brazilian cyberunderground comes news of a “re-ignited” banking malware which is using Facebook as a means of distribution. The threat itself
There are some interesting findings in our Q3 spam report.
The Internet is full of thoughts and perceptions, both true and false. Let’s investigate whether the Internet legend about hotel key cards storing guests’ personal information is fact or fiction.
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. We are posting funny pics of ourselves to amuse
What is the difference between real and theoretical threats?