Juggling with cards: doing criminal business on ATMs, part 2
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
3296 articles
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren’t good at servicing their computers, I often have to apply my expertise once again.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
If you use an ATM card, you are of interest to skimmers. How do these criminals act and how can you keep your bank account safe?
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We have a special solution for multi-device users. If you are using our products on many devices, we recommend you register on the My Kaspersky web portal.
We collected the 10 best tweets related to an IT security event in 2014.
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.