
Antimalware Technologies: terms explained
Every security vendor has a portfolio of advanced “anti-malware technologies” that make its products good and even better than all the rest.
227 articles
Every security vendor has a portfolio of advanced “anti-malware technologies” that make its products good and even better than all the rest.
Hardware is usually considered relatively safe and clean — as opposed to software which is usually the layer suffering from bugs and malware. But this is no longer true
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
Cybercriminals go at great lengths to throw researchers off their scent, but just like in the “offline” crime world they make errors and leave peculiar traces behind, making them look a bit silly, while the cyber-forensic experts get happy.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
“A single cyberincident can kill a business” may sound like an exaggeration, but it is not. In this blog post we prove it with two different stories.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What is the best way to start assessing your company’s cybersecurity issues? First, look around at what you have.
A researcher has developed a nasty bootkit capable of taking complete control of OS X devices. Here is what you need to know.
Cryptolocker is still making the rounds, even though its peak seems to have passed. Or is it just an illusion? How does it affect businesses? Read some real stories and explanations in the new blogpost at Kaspersky Business.
A new malware hits banks and their clients worldwide. Codenamed Chthonic, it is actually an evolved version of notorious Zeus banking Trojan.
2014 was marked by a streak of major cyberattacks on large retailers in the US. In most cases, PoS malware was at play. Now retailers are scrambling to improve their Point-of-Sale terminal security. It’s encouraging, but a pity that it took so long.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
Kaspersky Lab experts unveiled new Linux-targeting malware related to the infamous Turla APT. Such modules were known to exist before, but never met in the wild. Until now.
Sony Pictures Entertainment fell victim to a massive hack. Attackers used destructive malware to bring SPE networks down, while stealing up to 11 TB of data, which included both trade secrets, yellow press fodder, passwords to social networks accounts, and a lot of private information.
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.