Not-a-Virus: What is it?
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
164 articles
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Adware found on 250 million computers spies on users and can install other software.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
We investigated three cases of ATM robbery — involving remote-controlled malware, a Bluetooth keyboard, and a drill.
Are you a fan of heavy metal music? Are you an expert in cybersecurity? Take our quiz and find out if you can distinguish metal bands from cyberthreats!
Downloaded a program called Netflix Login Generator? Delete it immediately!
A story of two amateurs who were able to spy on Italian officials for years without getting caught.
Kaspersky Lab experts create a cure for CryptXXX. For the third time.
We explain three important concepts underlying antivirus action: signatures, the nature of viruses, and how antivirus solutions remove malware.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
Hospital pays ransomware ransom, does not get files back.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.