How pirates hook gamers
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
768 articles
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
In this episode of the Kaspersky Lab podcast, the team takes a look at hacks in OKCupid, the acquisition of Eero, and connected refrigerators.
A preview of the 2019 Security Analyst Summit from Kaspersky Lab with Sergey Lozhkin and Jeff Esposito.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
Jeff and David take a look at a recalled smart watch in the EU, faulty webcam covers from the NSA, changes in iOS, and more.
In this Security Analyst Summit preview, Jeff talks with Vitaly Kamluk of Kaspersky Lab’s Global Research and Analysis team.
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Let’s take a look at a VPN from Facebook that is more than meets the eye, a bug in FaceTime, happy trails to Internet Explorer and good privacy work from Mozilla.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
We look at some headaches for Google and Facebook, a “hacked” Nest sending out an ICBM warning, the Girl Scouts covering cybersecurity, and more.
WhatsApp and Facebook are swimming in links to ticket giveaways for fairs and airlines. Don’t get excited, though; the tickets are fake.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
In this episode, Jeff and Dave discuss getting back at telesales, the latest from CES, the Town of Salem breach, and some disturbing data sales by US telcos.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
In this Security Analyst Summit preview, Jeff sits down with Brian Bartholomew of GReAT to discuss the conference and his upcoming training on threat intelligence.
In this episode, Dave and Jeff talk New Year’s cybersecurity and privacy resolutions.
In this episode, Dave and Jeff discuss ways to help protect your family’s home over the holidays.