
Quiz: Can you tell a cyberthreat from biological one?
Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce
3332 articles
Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
It feels good when something you created does better than expected. When we posted recently about the NoMoreRansom project, which started as a joint initiative of Europol, the Netherlands police,
It’s the most wonderful time of the year — families gearing up for the holiday season, bright-eyed shoppers making their lists and checking them twice…cybercriminals licking their chops and picking
A few years ago, a criminal gang in India was making easy money off tech-illiterate people in Europe, Australia, and Great Britain. They did quite well until they encountered Kaspersky
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
Facebook’s settings are a moving target. Over the past few years, the company has changed various settings several times, adding, moving, even removing options. Now it’s really easy to get
Over the past few weeks, teams from 19 universities in the US and UK competed in Kaspersky Lab’s Cybersecurity Case Study Competition, hosted by The Economist’s Which MBA? site. The
Public awareness of — and wariness about — Web privacy continues to grow. That should come as no surprise: These days, pervasive cybertracking affects everyone. In this article, the last
Do you remember where the term “virus” came from? Yes, I’m talking about biological viruses, after which IT security specialists named the computer programs that insert their own code into
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
The Internet is up to its ears in ads. They can overwhelm pages and make it hard to focus on the content. We recently explained how Internet ads work, and
This past weekend, November 26 and 27, people traveling on the San Francisco Municipal Railway were surprised to find out that they didn’t have to pay for their rides. Everyone
According to our recent survey, more than 70% of active Internet users have considered quitting their social networks, primarily, they say, because they waste too much time on them. I
Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in
New York City is one of those places that people from around the globe make a pilgrimage to see. During the holiday season, Radio City Music Hall and the tree
Do you have any idea of how many online services you actually use or sites and forums that you visit? If you were to track and count, the sheer number
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the
Lately, tech companies have gone absolutely crazy for machine learning. They say it solves the problems only people could crack before. Some even go as far as calling it “artificial