
How hidden mining threatens your business
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
66 articles
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Kaspersky Safe Browser for iOS lets you filter unwanted content — violence, adult materials, drugs, and more.
Kaspersky Safe Browser for iOS protects you from phishing, malicious sites, and spammy links.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
Find out if you can avoid traps set by fraudsters for Black Friday sales.
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Careless behavior online can have devastating personal and financial consequences. Here are seven common shortcuts to avoid.
Facebook launched Aquila, a solar-powered drone which took its inaugural flight last week. Why does the social network need its own drones and how it is connected to the Google Loon project?
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Do you know how many companies are actually tracking you when you visit a single website? The answer may surprise you.