Transatlantic Cable podcast, episode 18
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
231 articles
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
A lot of ads on the Internet promote easy ways to earn money. They tend to lead to fishy places — say, a post from an alleged mother of three
Apple iPhone and iPad users usually believe they are safe. There’s no malware for iOS, they say. Apple does little to discourage the impression — the “fruit company” doesn’t even
Modern smartphones have way more memory than desktop computers had a decade ago. Out of space? Why bother deleting anything when you can just replace your old 64GB memory card
In the face of malware, Android has a very good defense mechanism — the app permissions system. This system defines a set of actions an app is allowed (or not
Meitu, the ‘anime-makeover’ app is doing something that users perhaps didn’t realize they’d signed up to. It’s been found to be harvesting all sorts of data on users, including your location, reading,
We often advise Android users to download apps from official app stores only. It is much more secure to search for apps on Google Play because all apps in the
Sometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote,
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
Last week, we talked about desktop ransomware, which is certainly nasty stuff. Ransomware is found not only on desktops, but also on mobile devices — and it is also on
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on