Disarming Flash exploits
Tell me what you think of Adobe Flash and I’ll tell you if you work in cybersecurity. To most people, Flash is something that your browser asks you to update
761 articles
Tell me what you think of Adobe Flash and I’ll tell you if you work in cybersecurity. To most people, Flash is something that your browser asks you to update
Blackmail is a crime as old as time, and modern technology has helped it — like so many other things — explode. Criminals relieve their victims of money in a
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Last year, we joined forces with Dutch law enforcement to launch the NoRansom website, which helps victims of CoinVault ransomware restore access to their data. Later, we enhanced the website
Jornt van der Wiel is a member of our GReAT — Global Research and Analysis Team — and our top ransomware and encryption expert. He lives in the Netherlands, and
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
As we keep saying, it’s very important to be aware of the latest cybersecurity news and threats. Being prepared is more than half the battle. However, even those who know
When ransomware hits, it’s natural to wonder if it might be worth paying the ransom to get your electronic life back with a minimum of hassle. At Kaspersky Lab, we
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
There’s a rumor flying around the Internet that up to 40 million iCloud accounts have been compromised. Now, we normally wait for extra information and corroborating data to back up
Recently, English- and Russian-speaking people were attacked with a new ransomware Trojan called Ded Cryptor. It’s voracious, demanding a whopping 2 bitcoins (about $1,300) as ransom. Unfortunately, no decryption solution
Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of
Last week, we talked about desktop ransomware, which is certainly nasty stuff. Ransomware is found not only on desktops, but also on mobile devices — and it is also on
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
Having a separate PC for each member of the family is no longer a luxury. Grandma wants to check on how her Facebook friends are doing, Mom needs to shop
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added