LokiBot: If not stealing, then extorting
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
454 articles
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
This week’s Transatlantic Cable podcast dishes on pizza, unsafe kids smartwatches, and more.
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
Modern technology actually helps phone scammers — what you need to know to stay safe.
Introduction Sometimes personnel may take cybersecurity requirements too lightly, leading to dramatic consequences for the organizations they work for. In the recent WannaCry ransomware epidemic, the human factor played a
Global IT security problems like the recent Petya attack are of clear concern to large corporations — but they affect common people as well.
The trendy Nimses social network has a ways to go in terms of security and privacy.
IT Security Risks Special Report Series 2016 Kaspersky Lab Download the PDF version of the report Content Introduction Lack of expertise: measuring direct financial impact One out of forty: new
What is General Data Protection Regulation and what should you do about it
Recapping the 2017 iteration of Kaspersky Lab’s annual conference, the Security Analyst Summit, with 10 Tweets.
Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.
A phishing scam to try and get you to hand over your battle.net account details is offering a free pet. There’s no free pet.
Kaspersky Safe Browser for iOS protects you from phishing, malicious sites, and spammy links.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
The war with cyber-evil long ago turned into a war of algorithms. And effectiveness depends on the flexibility and reliability of the self-learning systems.
How to choose an antivirus solution without falling for advertising tricks.
In our previous article on this topic, we looked into the history of memory-only attacks, also taking a glance at attack scenarios and appropriate defensive technologies. Now it is time
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.