How using free VPNs could land you in a botnet
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
20 articles
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
Kaspersky Lab security expert Vitaly Kamluk answers our readers’ questions about DDoS and botnets counteractions.
Simda was a rather mysterious botnet that had been used for dissemination of third-party potentially unwanted and malicious software. It has a built-in tools to detect and evade emulation, virtual machines and security tools, effectively allowing the bot to stay out of grid – apparently for years.
A peculiar botnet codenamed Simda has been taken down as a result of a joint operation between a number of law enforcement agencies and commercial organizations.
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
Readers who follow our information security digests may have already noticed several exotic incidents and malware campaigns, which took place over the past three months. Some of them deserve special
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.