
Switcher hacks Wi-Fi routers, switches DNS
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
817 articles
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
This past weekend, November 26 and 27, people traveling on the San Francisco Municipal Railway were surprised to find out that they didn’t have to pay for their rides. Everyone
Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past
Black Friday’s coming, and that means huge rebates and sales. Actually, the hype has already started and the sales have begun. If you have ever tried shopping offline on that
If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do
This article might save you some $300. That’s the average ransom extortionists ask their victims to pay to restore access to victims’ encrypted files or locked computers. It’s quite easy
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
Ransomware has probably earned more posts on the Kaspersky Daily Blog than any other type of threat. Frankly, we’ve posted so many articles, pieces of advice, tips, and tricks, that
Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to
Kaspersky Lab not only develops security solutions but also helps to catch criminals and creates free decryption tools for ransomware victims. The utilities can be downloaded from the No More
1. Why do I need to read this? This article will help you to protect the money in your bank account. 2. Mobile banking Trojans — what are they? Every
We talk and talk (and talk) about how to behave — and even how to survive — in the digital world. And we hope it’s not in vain, that our
We often advise Android users to download apps from official app stores only. It is much more secure to search for apps on Google Play because all apps in the
Over the past few days, there has been some chatter surrounding Spotify based on a user’s post in the company’s community forum: There’s something pretty alarming going on right now
Every day, new versions and variations of ransomware pop up. Malware creators are still sure that ransomware is their ticket to easy street, despite the fact that law enforcement agencies