“Puss in Boots” APT campaign
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
377 articles
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
In this edition of the Kaspersky Transatlantic Cable podcast, Jeff and Dave discuss smart nappies (diapers), the Equifax fine and more.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
Dave and Jeff discuss the latest trend in US cities paying the ransom, hacking the smart home, Cirque du Soleil app issues and more.
How some students are cheating their way to exam success with dark web diplomas and hacked grades.
In this episode of the Kaspersky podcast, Dave and Jeff discuss deepfakes at Facebook, telcos behaving badly, Alexa spying, and more.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
What the Hoax verdict means, and why such software is becoming more of a problem.
A new spam mailing threatens the reputations of small businesses websites.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.