
Ask the expert: Jornt van der Wiel talks ransomware
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
163 articles
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Hacked medical equipment can cost patients a lot — their health or even their lives.
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
Hospital pays ransomware ransom, does not get files back.
Criminals behind the ATM Infector campaign are turning ATMs into invisible skimmers.
While many got a good laugh about CryptXXX evolving to beat out tool, ransomware is no laughing matter. Introducing V2 of our tool.
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
Manufacturers need to change their mindset when it comes to the IoT
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Does your use of social media make you a liability to your company?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.
Acecard is one of the most advanced banking trojans. It’s capable of overlaying more than 30 banks’ and financial systems’ apps and is spread via Google Play.
What’s wrong with ATMs’ security and what should the banks and manufacturers do about it.
The SAS 2016 has come and gone. Here’s a look back on the top 10 Tweets from the conference to relive the magic.
At The SAS 2016, Kaspersky Lab researchers discussed the newly discovered Poseidon