Morris Worm Turns 25
This weekend we had a memorable date. It marked 25 years since the publication of the first computer malware that was widespread enough to be featured in the news. The
177 articles
This weekend we had a memorable date. It marked 25 years since the publication of the first computer malware that was widespread enough to be featured in the news. The
At Kaspersky, we take our responsibility to keep you guarded against attacks very seriously, which is why we’re continuously familiarizing you with the latest methods that are out there and
It’s officially the time of year again that brings the tricks and treats with it, and in honor of this month, which also happens to be National Cybersecurity Awareness Month,
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
In news that has been making the rounds on various forums since mid-August, analysis conducted by independent IT security research firm MRG Effitas indicates that very few security companies can
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
The cyber threat landscape is constantly evolving and keeping up with those changes is an intense project. Kaspersky Lab has a team of research experts who are relentless in sniffing
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
Everyone knows you should have antivirus applications running on your work and personal computers, but far fewer people take seriously the threat of malware attacks to their mobile devices –