Update: CryptXXX solved again
While many got a good laugh about CryptXXX evolving to beat out tool, ransomware is no laughing matter. Introducing V2 of our tool.
164 articles
While many got a good laugh about CryptXXX evolving to beat out tool, ransomware is no laughing matter. Introducing V2 of our tool.
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Manufacturers need to change their mindset when it comes to the IoT
Does your use of social media make you a liability to your company?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.
What’s wrong with ATMs’ security and what should the banks do about it
The SAS 2016 has come and gone. Here’s a look back on the top 10 Tweets from the conference to relive the magic.
At The SAS 2016, Kaspersky Lab researchers discussed the newly discovered Poseidon
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.