The Perils of Securing the Computer in Your Pocket
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
775 articles
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale
Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
It’s a common belief that Macs are safer than PCs because most computer viruses are designed to attack Windows machines and not Macs. Recent high-profile Mac-targeted viruses like MacDefender and
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have
It used to be that Mac users could rest easy, knowing that the vast majority of computer viruses were written to target Windows users, which makes sense given that the
If you own an Android device, your phone could soon be used against you. Research released in late September introduced a new tool that targets Android devices by taking control
Ryan Naraine interviews Kaspersky Lab Chief Technology Officer, Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky lab’s vision for protecting