WannaCry: Not dead yet
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
3159 articles
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Resources for security professionals to analyze vendor capabilities across a wide variety of threat intelligence services.
We take a look at the Rotexy mobile Trojan: where it comes from, how it behaves, and how to get rid of it using a couple of regular SMS.
The winter sales season is the hottest time of the year for shoppers and financial phishers. Be careful!
Banking Trojans are increasingly focused on online stores. We explain how not to become a victim of malware during the annual holiday sales.
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.
I decided to conduct a sort-of audit to try and see to what extent our presentation of the facts has allowed people to make up their own minds on the matter.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.
See how your views on cybersecurity line up with the opinions of CISOs from around the world.
Blockchain was designed to reliably store data forever. Unfortunately, such design conflicts with modern privacy legislation trends.
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
How an analyst can build a threat intelligence workflow to run effective and complex investigations.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Our daylong conference aimed to empower the next generation of cybersecurity professionals.
Our tools to secure, monitor, and manage customer infrastructure can be integrated with Autotask PSA.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Tips to protect your devices, your home network, and your privacy against cybercrime.
Protecting privacy online can be good for our mental health. Two reasons: it makes more time for offline socializing and keeps distracting ads at bay.