How cybercriminals defraud freelancers
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
674 articles
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
Lately, millions of PCs all over the world have been regularly displaying a Microsoft notification reading, in essence: “Dear users, how about if you upgrade to Windows 10?” Sometimes, the
Access to the account of any user is a matter of interest for hackers. Even if the owners have never shared their credit card numbers or PINs in direct messages,
Starting on June 10, many people will be tuning into Euro 2016 football championship and trying to consume as much info as they can. Much like many other large sporting
Everyone likes Twitter. Well, okay, maybe not everyone, but at least 310 million users visit the microblogging platform monthly. And now these 310 million have to consider changing their Twitter
Update: The product described in this post is discontinued. To protect your desktop or laptop use . Someone may call it paranoia; some think it’s just common sense: At Kaspersky
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
Having a separate PC for each member of the family is no longer a luxury. Grandma wants to check on how her Facebook friends are doing, Mom needs to shop
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading rapidly but even picking up secondary characteristics. Take Cerber, ransomware first spotted in the wild back in February
In 2008 we had the Beijing Olympics. In 2010, everybody awaited the FIFA World Cup in South Africa. Now, the Olympics are coming to Rio de Janeiro in a few
As we’ve mentioned earlier, the creators of TeslaCrypt, the constantly evolving trojan-cryptor, have suddenly decided to stop its distribution and release a master key. A master key is a key
If you cast your minds back to the summer of 2012 then you’ll vaguely remember something about LinkedIn being hacked. Data was stolen and there were plenty of red faces
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
At the tail end of last month, we announced that our researchers had developed a decryption tool to beat CryptXXX ransomware and help the victims get their files back for
Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality,
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune
Listen, we’ve all been there; short on cash, recent move or staying at a friend’s home and without Wi-Fi. A quick scroll through the available networks near you show that