Steam stealers: your account is their target
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
761 articles
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
Cybercriminals are starting to shift their focus from stealing personal data to other actions which bring immediate profit, experts at SANS institute say. At the recent ‘The Seven Most Dangerous
At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
As a follow-up to our recent foray into ransomware, we’re pleased to offer a fundamental practical guide on how to deal with ransomware.
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the SAS 2016, Kaspersky Lab’s GReAT team unveiled how dozens of banks lost millions of dollars via APT tools. We know that the blogs were a tad long so
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
In 2015 we saw the rise of cybercriminals who rob banks directly. Several groups have mastered APT tools and techniques, dipping their hands into the “pockets” of at least twenty-nine
Any business that has ever encountered a Distributed Denial of Service attack is aware how painful it might be. Aside from a major interruption of all processes involving the Web, it is basically well-guaranteed post-incident damages and extra expenses.
So the whirlwind that is CES is in full swing. Companies of all sizes are introducing some pretty sweet products that will make our lives more connected and easier and
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
iPower, a company behind a cloud storage service for government agencies, was surprised to discover a virus lurking in one of the body cameras used by policemen. People are getting
Malware development and our attempts to fight it sometimes remind us of a deep TV series: one can trace how “characters” acquire new skills, overcome hardships and make new achievements.
The Internet changes from year to year and online threats develop along with the World Wide Web. So what will the cyber-nightmare of home and corporate users look like in
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which