Android trump card: Acecard
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
3298 articles
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
Do you stream music on Spotify at home or work? Chances are that you are one of the millions of users to the popular online service. So you should read
Sometimes when installing freeware, users rush and often wind up installing “extra” features that can include adware, unnecessary extensions and browser toolbars. It’s quite understandable as anyone can miss one
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
Every year Kaspersky Lab products take part in a number of short- and long-time tests that are held by independent laboratories. It’s no secret that our solutions continually show high
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
You can literally find anything on the Internet; unfortunately this includes bad guys. There are thousands of ways to deceive an Internet user ranging from legal to illegal – some
The SAS has come and gone. A lot of great knowledge was dropped during the conference including insights on Poseidon, Adwind and Metel. As we come back to reality, we
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Believe it or not, math is important. While it may have been easy to roll our eyes at our childhood schoolteachers, human behavior is quite predictable and math helps in
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the SAS 2016, Kaspersky Lab’s GReAT team unveiled how dozens of banks lost millions of dollars via APT tools. We know that the blogs were a tad long so
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
In 2015 we saw the rise of cybercriminals who rob banks directly. Several groups have mastered APT tools and techniques, dipping their hands into the “pockets” of at least twenty-nine
Chances are that your kids use at least one or more devices that are tied to the Internet. It is also likely that you want to limit the amount of
April 15 is a day that lives in infamy in the hearts of Americans. Now this date is not significant for any holiday, but rather the day that the Tax
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
Since the dawn of mankind, our species has been full of dreamers with a quest for unlocking the unknown. Through the years, we searched for it in alchemy, ancient rituals
3D-printing is a unique technology — it lets you produce almost anything quickly and accurately. Moreover, items can be printed using different materials like plastic, metal, wax and so on.