Switcher hacks Wi-Fi routers, switches DNS
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
86 articles
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
We explain three important concepts underlying antivirus action: signatures, the nature of viruses, and how antivirus solutions remove malware.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Digital advertising brings money to companies and relevant ads to you and me — and attracts fraud. How does it all work?
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Kaspersky’s free WindowsUnlocker utility brings your locker-infected computer back and gets rid of the malware.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.