Multipurpose malware: Sometimes Trojans come in threes
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
898 articles
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.
Check this out to know if you want to fall for one of the latest Facebook scams
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
How you can prevent Ransomware on your file share with Kaspersky Lab enterprise solutions.
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
Protect your browser and keep your passwords, card credentials and personal data safe with the help of Kaspersky Protection.
What happens when real cyber experts head to TV to stop cybercrime?
The vast majority of targeted attacks begin with simple steps; spear-phishing with malicious attachments or clickable links, or the infection of employees’ favorite websites (water-holing) to penetrate the security perimeter through the vulnerable browsers or other software. Don’t assume that because these methodologies are well-known, they are any less effective.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.