Scrimping on software could blow a hole in your budget
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
315 articles
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Living online is more comfortable than ever — do you really still need a helmet?
We’re witnessing an outbreak of a new breed of cryptomalware. Our experts have named it ExPetr (others call it Petya, PetrWrap, and some other names). The key difference with this new ransomware is that this time, criminals have chosen their targets with greater precision: Most of the victims are businesses, not consumers.
Just a few hours ago, a global ransomware outbreak began, and it looks to be as big as the WannaCry story that broke not so long ago.
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…