To pay or not to pay – the dilemma of ransomware victims
While FBI recommends victims to pay the ransom, Kaspersky Lab won back the access to the files for dozens of thousands of CoinVault and Bitcryptor victims.
341 articles
While FBI recommends victims to pay the ransom, Kaspersky Lab won back the access to the files for dozens of thousands of CoinVault and Bitcryptor victims.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
What is the difference between real and theoretical threats?
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We tend to think that protecting ourselves against future threats is most important. But, perhaps we need to take a step back and solve some of the major problems that we already know about.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
The concept of mobile malware working in bond with computer Trojans to steal money via online banking is not new, however Kaspersky Lab Q1 report indicates that it quickly gaining “market share”.
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated