WannaCry: Are you safe?
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
440 articles
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
Recapping the 2017 iteration of Kaspersky Lab’s annual conference, the Security Analyst Summit, with 10 Tweets.
Safeguarding data and combating cyberthreats in healthcare.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
It’s easy to neglect digital maintenance. Take our quiz to find out if you have the symptoms of digital cluttering.
Kaspersky Lab researchers disclose vulnerabilities in connected car apps.
Ransomware terrorizes users and companies around the world, preventing access to data and demanding more and more money for its safe return. Take this quiz and learn how to secure your digital life.
Healthcare technologies and mobile working practices are producing more data than ever before, so there are more opportunities for data to be lost or stolen.
How often do victims succeed in getting back money stolen by online scammers?
It is surprisingly easy to hack airline reservations, obtain banking data and other private information, steal tickets, and rack up air miles.
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
In our previous article on this topic, we looked into the history of memory-only attacks, also taking a glance at attack scenarios and appropriate defensive technologies. Now it is time
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.