
Go to a porn site, get a virus — right?
Most computer infections come from visiting porn sites, or so some people say. Are they right?
145 articles
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Our experts analyzed last year’s financial cyberthreats, and here is their report
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently researchers found that one such business — a big digital-marketing agency — went as far as installing adware on 250 million computers running Windows and macOS all over the world.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign
People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that encrypts users’ data and demands $100 in
When we talk about malware on Kaspersky Daily — and we do that pretty often — we typically choose those malware species that, according to our data, have impacted a
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it to Google.
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more than
So you think hackers and cyberspies are something you only see at the cinema? Think again! The Internet is crawling with weirdos and criminals who are just looking for a chance
ACCEPT AND CLOSE
Notifications