How using free VPNs could land you in a botnet
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
14 articles
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
Jeff and Dave discuss some interesting Facebook ads, Nancy Pelosi’s still-missing laptop, Emotet’s takedown, and more.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
On this podcast, Dave and Jeff discuss the latest scam targeting Travelex customers, a phishing attack on the UN, Australia relief being targeted by Magecart, and more.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
We often advise Android users to download apps from official app stores only. It is much more secure to search for apps on Google Play because all apps in the
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.