On the dangers of popular television series
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
86 articles
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Embedded systems demand special protection from infections similar to WannaCry.
Applications that offer to pay you for installing other applications tend to shove malware at you.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.