Do not become a link in a supply chain attack
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
373 articles
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
We’re hosting an online workshop at the European Information Security Summit 2018 to help businesses get their networks prepared for new and emerging threats.
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Next year is likely to see malware creators and distributors switch from ransomware to malicious Web miners.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.