How using free VPNs could land you in a botnet
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
15 articles
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
Jeff and Dave discuss some interesting Facebook ads, Nancy Pelosi’s still-missing laptop, Emotet’s takedown, and more.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.