Tricky Locky ransomware robs American hospitals
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
828 articles
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
A few months ago, we were approached by the Dutch TV show Opgelicht?!, which discusses various types of fraud. One of the subjects discussed was the “We-Cycle” phishing campaign where
If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. When irritated
Similar to other successful business sharks, cybercriminals are in constant search of new markets. They carry out experiments, change target audiences and provide feedback to the victims — all to
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
Cybercriminals are starting to shift their focus from stealing personal data to other actions which bring immediate profit, experts at SANS institute say. At the recent ‘The Seven Most Dangerous
At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
As a follow-up to our recent foray into ransomware, we’re pleased to offer a fundamental practical guide on how to deal with ransomware.
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the SAS 2016, Kaspersky Lab’s GReAT team unveiled how dozens of banks lost millions of dollars via APT tools. We know that the blogs were a tad long so
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
In 2015 we saw the rise of cybercriminals who rob banks directly. Several groups have mastered APT tools and techniques, dipping their hands into the “pockets” of at least twenty-nine
Any business that has ever encountered a Distributed Denial of Service attack is aware how painful it might be. Aside from a major interruption of all processes involving the Web, it is basically well-guaranteed post-incident damages and extra expenses.
So the whirlwind that is CES is in full swing. Companies of all sizes are introducing some pretty sweet products that will make our lives more connected and easier and
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces