5 Myths of Antivirus
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
177 articles
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.
Many of the websites that claim to be World Cup streaming services will harm your system and can steal your credit card information, if you let them.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Cabir, the first smartphone virus ever, turns 10. Here are some amusing facts about it.
Feds take down the Gameover botnet, there’s more trouble for OpenSSL, Google publishes data on global Gmail encryption, and Edward Snowden’s first NSA revelation came out one year ago.
Senior Security Researcher David Emm explains exactly what GameOver Zeus means for you, and how you can keep yourself protected.
A new piece of ransomware targeting Apple users emerges along with a hybrid malware combining Zeus and Carberp. There’s also an issue with the Spotify Android app.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
A new piece of ransomware is targeting Android users and may be related to the infamous CryptoLocker malware.
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
The concept of mobile malware working in bond with computer Trojans to steal money via online banking is not new, however Kaspersky Lab Q1 report indicates that it quickly gaining “market share”.
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
In the days of cyberwars and cybermafia, it’s hard to recall times when computer viruses and worms were just research projects or pranks. Back then, there were no monetary incentive
Perhaps it has happened to you. One day you open your Internet browser and instead of going to your usual homepage, you go to the landing page of a search
A variety of methods can lead users to malicious sites, but the one known as “typosquatting” relies entirely on unforced user error.
The Onion Router Tor, one of the resources on Darknet, has been known for a long time. At first it was only known of by experts and enthusiasts interested in
To summarize Costin Raiu, the director of Kaspersky Lab’s research arm, the vast majority of malicious files are what he calls crimeware — computer programs deployed by cybercriminals seeking to
There is an all-too common misconception that in order to become infected with web-propagated malware, you must visit sketchy parts of the Internet’s underbelly or a website within that broad
Ransomware in general is not exactly the nastiest malware out there, but a new variant – called CryptoLocker – is particularly worrisome because it actually does what most ransomware merely