
Looking at the financial cyberthreats of 2017 through a business lens
Our experts analyzed last year’s financial cyberthreats, and here is their report
178 articles
Our experts analyzed last year’s financial cyberthreats, and here is their report
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS
We love cybersecurity and find it fascinating. Cybercriminals invent new ways to attack victims daily, and we counter them with tools to protect people. It’s a game of cat-and-mouse, but
People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that encrypts users’ data and demands $100 in
When we talk about malware on Kaspersky Daily — and we do that pretty often — we typically choose those malware species that, according to our data, have impacted a
Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in
We talk and talk (and talk) about how to behave — and even how to survive — in the digital world. And we hope it’s not in vain, that our
Over the past few days, there has been some chatter surrounding Spotify based on a user’s post in the company’s community forum: There’s something pretty alarming going on right now
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
Here is a scenario for you: You are walking around, catching Pokémon, getting fresh air, people-watching, taking Fido out to do his business, when something catches your eye. It’s a
When ransomware hits, it’s natural to wonder if it might be worth paying the ransom to get your electronic life back with a minimum of hassle. At Kaspersky Lab, we
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences