Ransomware’s history and evolution in facts and figures
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
0 articles
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
The big hunt begins: hackers are eager to make their buck before every merchant in US moves to chip-and-pin cards
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
Researchers expose how a criminal can hack air conditioners to crash the power grid.
What’s wrong with ATMs’ security and what should the banks do about it
At the Chaos Communication Congress a university professor tells how to forge keys using a 3D printer and we come up with a few tips how to protect yourself from that
At the Chaos Communications Congress, researchers explain how Dieselgate happened
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
Yesterday The European Court of Justice ruled that the Safe Harbor agreement is invalid: what does this decision mean for your personal data?
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Security researcher Chris Rock discovered, that it’s very easy to kill a human. All you need is just a computer with Internet access, some knowledge and common sense.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
Recently Interpol, Microsoft and Kaspersky Lab revealed and shut down a huge botnet which zombified about 770,000 of PCs worldwide. Check this story out and then check your PC.