
Not everybody on the Internet is whom they seem to be
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
3332 articles
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Last year, we joined forces with Dutch law enforcement to launch the NoRansom website, which helps victims of CoinVault ransomware restore access to their data. Later, we enhanced the website
A year ago, a massive breach had a profound impact on the lives of registered users of Ashley Madison, a “dating” site for married people, and nearly killed a thriving
In sports, teams are always looking for ways to get ahead. Players and teams continually, frantically search for new ways to squash their competition en route to claiming another title.
The threat landscape is ever changing, and our Global Research and Analysis Team (GReAT) is constantly looking at new attacks and finding ways to help protect the world from those
Jornt van der Wiel is a member of our GReAT — Global Research and Analysis Team — and our top ransomware and encryption expert. He lives in the Netherlands, and
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you do devote some time to adjusting the
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
As we keep saying, it’s very important to be aware of the latest cybersecurity news and threats. Being prepared is more than half the battle. However, even those who know
The total number of people in the world is believed to be about 7.4 billion. By the end of 2015 Facebook had climbed to 1.59 billion users. With an annual
When ransomware hits, it’s natural to wonder if it might be worth paying the ransom to get your electronic life back with a minimum of hassle. At Kaspersky Lab, we
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
There’s a rumor flying around the Internet that up to 40 million iCloud accounts have been compromised. Now, we normally wait for extra information and corroborating data to back up
Recently, English- and Russian-speaking people were attacked with a new ransomware Trojan called Ded Cryptor. It’s voracious, demanding a whopping 2 bitcoins (about $1,300) as ransom. Unfortunately, no decryption solution
Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
What do you do when your e-mail filters fail and you get a bunch of spam letters? Most probably, you delete, delete, delete without even opening them. Of course, that’s