Naked online: cyberthreats facing users of adult websites and applications
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
320 articles
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
The newest threats you should know about, and measures worth taking to keep your business and clients safe.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?