
A friend in need — or is it?
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
397 articles
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Next year is likely to see malware creators and distributors switch from ransomware to malicious Web miners.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Cryptocurrency mining is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up “mining,” or adding blocks to a
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
Applications that offer to pay you for installing other applications tend to shove malware at you.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
Recapping the 2017 iteration of Kaspersky Lab’s annual conference, the Security Analyst Summit, with 10 Tweets.
Kaspersky Lab researchers disclose vulnerabilities in connected car apps.