
Not everybody on the Internet is whom they seem to be
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
1141 articles
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
If the rumors are true, 40 million Apple iCloud accounts have been hacked
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
Kaspersky Internet Security and Kaspersky Total Security can help protect your privacy in a variety of ways including not allowing your webcam to serve as a spying device.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Let’s talk about new security technologies in Windows 10: Are they enough to make the new operating sys-tem totally secure?
Hacked medical equipment can cost patients a lot — their health or even their lives.