
Bye-bye, TeslaCrypt: Grand finale
According to the theory of probability, strange things have to happen every now and then: There is a small chance that a particular strange thing might happen and an infinite
1404 articles
According to the theory of probability, strange things have to happen every now and then: There is a small chance that a particular strange thing might happen and an infinite
If you cast your minds back to the summer of 2012 then you’ll vaguely remember something about LinkedIn being hacked. Data was stolen and there were plenty of red faces
Petya and Mischa are friends. They usually do everything together…. Oh, wait, this is not some “Russian for Dummies” book, it’s the Kaspersky Daily blog. So, Petya and Mischa are
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
Today, the thing I dreaded would happen sooner or later, finally occurred: I arrived at work, put my hand onto the turngate… and nothing happened. It didn’t let me in.
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
At the tail end of last month, we announced that our researchers had developed a decryption tool to beat CryptXXX ransomware and help the victims get their files back for
In the United States, the political season is heating up as the country is prepping for their presidential election for the successor to Barack Obama. The whole process of political
I was blinded with a strong light and then was asked the life-and-death question: “What did you do on the 5th of the last month between 10 PM and 11:30
They say that Internet unites people, which is difficult to argue. Users of the World Wide Web can call their relatives in Europe, find a groupmate from another state in
What were you doing when you were 10-years old? Chances are it was not as profitable as this youngster from Finland. Earlier this week, it was announced that a boy
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune
Listen, we’ve all been there; short on cash, recent move or staying at a friend’s home and without Wi-Fi. A quick scroll through the available networks near you show that
Over the past few years drones have evolved from toys to powerful tools that can be used by pretty much everybody. Armies use them for scouting and aerial spotting, coast-guards
Heading into the NFL Draft, Laremy Tunsil was considered by many to be the top player in the draft and would be one of the first players selected. Unfortunately for
Each day, Internet users around the world are under attack as new cyber threats are deployed by criminals. Unfortunately, many people still are not using antiviruses and firewalls at all
Yesterday one of 2ch’s users attracted the attention of Russian media. This man streamed video from the hacked computers on YouTube. The anonymous user turned these sessions into a real
While Freddie Mercury may have belted out Is this real life? Is this just fantasy? over 40 years ago, today’s parents are faced with the stark reality that their children
The common user experience when it comes to ransomware looks like this: you open a website then accidentally download and install a piece of software. You might even not notice
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
Curios fact: in the United States the transition of merchants to EMV cards (popularly known as chip-and-pin cards), which has the purpose of fighting fraud, is actually driving fraud losses