Cybercrime is focusing on accountants
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
91 articles
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
In the Netherlands, the creators of one of the first ransomware cryptors are on trial, thanks largely to us.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Global IT security problems like the recent Petya attack are of clear concern to large corporations — but they affect common people as well.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Embedded systems demand special protection from infections similar to WannaCry.