Last Week in the News: NSA’s Confessions and Apple ID Hijacking
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you
2908 articles
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you
Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC. But nevertheless, you have an opportunity
Imagine that you are a manager of a famous pop star. You have a meeting in a café, and some time later you realize that you have forgotten your phone
A variety of methods can lead users to malicious sites, but the one known as “typosquatting” relies entirely on unforced user error.
“Gadget” has recently become an extremely popular word. We now use a wide range of gadgets, read the latest news from this sphere in various blogs and websites, and eagerly
Kaspersky Lab Senior Security Researcher, David Jacoby talks about countering social engineering in an office environment. Protecting your company from attack is easy if you take the right steps. [youtube https://www.youtube.com/watch?v=yhQMkQkMmSE&feature=youtu.be]
A number of Samsung’s popular Galaxy devices reportedly contain an alleged backdoor that could give attackers remote control of vulnerable handsets, effectively turning successfully exploited phones into mobile spying machines.
Sometimes your Kaspersky Lab product may suddenly display a red protection status that warns you about obsolete databases. You can run an update, but the protection status indicator won’t change.
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,
This is a story of when security works, but it may also be the story of a new way to exploit the internet for dirty money: As you can easily
We all know that it is wiser to do things beforehand than to deal with the results of our carelessness. However, often we face situations when it is too late
Late on a Friday afternoon in the middle of February Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker
No doubt it has been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin exchange marketplace out there, has shut down, putting a
Our smartphones might have content we do not want others to see, even friends and relatives. Imagine the situation: you are planning a birthday surprise for your significant other and
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
The Olympics are over, but there’s one more top performer to consider for a gold medal: Kaspersky Lab, whose antivirus and computer security products performed more successfully than any other
In one of our previous tips we explained to you how to manually select actions on detected threats. When a suspicious file or activity is detected, Kaspersky Internet Security shows
The Onion Router Tor, one of the resources on Darknet, has been known for a long time. At first it was only known of by experts and enthusiasts interested in
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as