
Mobile beasts and where to find them — part one
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
176 articles
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
The outbreak of Trojan ransomware WannaCry has already caused a heap of trouble to all kinds of businesses. However, we expect that companies whose infrastructures employ embedded systems are feeling
The unprecedented outbreak of Trojan ransomware WannaCry has created a worldwide plague affecting home users and businesses. We have already posted some basics about WannaCry, and in this post we
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time away from
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky Lab
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Unpatched flaws in Android make your device vulnerable to “Invisible” infection. You better find out now in order to protect yourself.