SynAck ransomware: The doppelgängster
This new version of SynAck ransomware uses sophisticated evasion techniques.
67 articles
This new version of SynAck ransomware uses sophisticated evasion techniques.
What is a cryptocurrency wallet, and how do you choose which one suits you best?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
At the Security Analyst Summit, our researchers showcase how a Brazilian group steals card information and creates clones of chip-and-PIN cards.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
A representative of the US Department of Homeland Security claims that he hacked into a Boeing 757.
POST IS BEING UPDATED LIVE. The world is being hit with yet another ransomware epidemic. It’s called Bad Rabbit, and here’s what we know about it so far.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Adware found on 250 million computers spies on users and can install other software.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
How messages with confirmation codes from banks are intercepted and what can you do to protect yourself.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone