
Scrimping on software could blow a hole in your budget
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
402 articles
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Next year is likely to see malware creators and distributors switch from ransomware to malicious Web miners.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Cryptocurrency mining is an IT industry buzzword and a rapidly growing phenomenon. As part of this far-reaching trend, more and more people take up “mining,” or adding blocks to a
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.