To pay or not to pay – the dilemma of ransomware victims
While FBI recommends victims to pay the ransom, Kaspersky Lab won back the access to the files for dozens of thousands of CoinVault and Bitcryptor victims.
534 articles
While FBI recommends victims to pay the ransom, Kaspersky Lab won back the access to the files for dozens of thousands of CoinVault and Bitcryptor victims.
Many would think that the root of all the cyber-evil is tech itself, and once you say no to fancy smart devices, all those spooky cyber-threats should go away. If
With all of the hacks in the news, you may feel scared to shop online. Kaspersky Lab can ease your fears with the Safe Money feature of Kaspersky Internet Security 2016.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
I wonder what will happen when there are no more infosec problems. Will our Threatpost news blog convert to a digest of kitty cats? Is this bright future feasible at
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.