LokiBot: If not stealing, then extorting
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
629 articles
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
The post is being updated as our experts find new details on the malware.
We’ve already seen two large-scale ransomware attacks this year — we’re talking about the infamous WannaCry and ExPetr (also known as Petya and NotPetya). It seems that a third attack is on the rise: The new malware is called Bad Rabbit — at least, that’s the name indicated by the darknet website linked in the ransom note.
In October 2017, Kaspersky Lab initiated a thorough review of our telemetry logs in relation to alleged 2015 incidents described in the media. These are the preliminary results.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
The largest motor show in the world is the best place to see what cars will look like in the near future.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices — and if your device should be rooted at all.
Just a few hours ago, a global ransomware outbreak began, and it looks to be as big as the WannaCry story that broke not so long ago.
Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently researchers found that one such business — a big digital-marketing agency — went as far as installing adware on 250 million computers running Windows and macOS all over the world.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice