
Our cure for BadUSB
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
793 articles
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
There’s a rumor flying around the Internet that up to 40 million iCloud accounts have been compromised. Now, we normally wait for extra information and corroborating data to back up
Recently, English- and Russian-speaking people were attacked with a new ransomware Trojan called Ded Cryptor. It’s voracious, demanding a whopping 2 bitcoins (about $1,300) as ransom. Unfortunately, no decryption solution
Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of
Last week, we talked about desktop ransomware, which is certainly nasty stuff. Ransomware is found not only on desktops, but also on mobile devices — and it is also on
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
Having a separate PC for each member of the family is no longer a luxury. Grandma wants to check on how her Facebook friends are doing, Mom needs to shop
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added
Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it’s been reported that both social networks have had troves
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading rapidly but even picking up secondary characteristics. Take Cerber, ransomware first spotted in the wild back in February
When you are sick, you head to the doctor. However, when your computer is suffering from an infection, you probably shouldn’t ask for your doctor’s advice. At Kaspersky Lab, we
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
Unlike previous malware trends that have varying purposes, ransomware’s is quite simple: Get Money. With a goal like that spurring on malicious developers, it’s no wonder ransomware’s star is on
As we’ve mentioned earlier, the creators of TeslaCrypt, the constantly evolving trojan-cryptor, have suddenly decided to stop its distribution and release a master key. A master key is a key
According to the theory of probability, strange things have to happen every now and then: There is a small chance that a particular strange thing might happen and an infinite
Petya and Mischa are friends. They usually do everything together…. Oh, wait, this is not some “Russian for Dummies” book, it’s the Kaspersky Daily blog. So, Petya and Mischa are
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
At the tail end of last month, we announced that our researchers had developed a decryption tool to beat CryptXXX ransomware and help the victims get their files back for