Ask the expert: Jornt van der Wiel talks ransomware
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
3199 articles
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
If the rumors are true, 40 million Apple iCloud accounts have been hacked
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Accurate identification of people’s faces is a very human process but computers are gaining on our processing. A look at what’s going on now and what we’ll see soon.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
An overview of the 10-year anniversary of Kaspersky Lab’s fan club.
Kaspersky Internet Security and Kaspersky Total Security can help protect your privacy in a variety of ways including not allowing your webcam to serve as a spying device.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
See some of our best yogis — and be seen yourself — in the #ITYogaChallenge!