2016 results, 2017 predictions
As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let’s see which of last year’s predictions came true and then try
395 articles
As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let’s see which of last year’s predictions came true and then try
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past nine months,
If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do
This article might save you some $300. That’s the average ransom extortionists ask their victims to pay to restore access to victims’ encrypted files or locked computers. It’s quite easy
Sometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote,
People are more into texting than talking. About 65% percent of us would prefer to have a long and painful conversation via Whatsapp than to have one-minute phone call or face-to-face meeting.
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and again, we see photos of
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in The Tragedy
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Nowadays, free public Wi-Fi is available almost everywhere in our cities. We can access the Web from the streets to the subway and buses, not to mention venues ranging from
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since it
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky Lab
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,