
Banking Trojans: mobile’s major cyberthreat
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
696 articles
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more than
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
The most scandalous threat is tickling the nerves of Android phones owners: Zimperium zLabs reported six gaping hole in Google OS in April 2015. They also told Forbes that while
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor of
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Many people still think that malware is a software that completely disrupts normal functioning of PCs. If your computer is working tip-top, it means it‘s not infected, right? Wrong. Malware creators are
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past. Once
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
The geopolitical conflicts in the Middle East have deepened over the last few years. The crisis is taking many forms, and the conflict in cyberspace is intensifying as different sides
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
ACCEPT AND CLOSE
Notifications