Lurk: Seek and destroy
How Kaspersky Lab helped the Russian police catch the cybercriminals behind the Lurk banking Trojan and Angler exploit kit.
769 articles
How Kaspersky Lab helped the Russian police catch the cybercriminals behind the Lurk banking Trojan and Angler exploit kit.
Powerful chatbots can replace real-life communication — and take over the world.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
How concerned should we be with industrial security?
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
What is sextortion, and how can we protect ourselves and our children?
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
New ransomware called Satana encrypts your files and blocks the operating system from booting.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.