
LTE-U: on the way to 5G
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
801 articles
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
The problem of ransomware isn’t getting better. Recent examples of wide-spread ransomware attacks, including CoinVault, CryptoLocker, and others indicate that cybercriminals are increasing their use of these types of attacks.
Cybercriminals are learning from each other. Take TeslaCrypt, for example. It is a relatively new family of ransomware; its samples were first detected in February 2015. The notable feature of
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
he Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor
In most cases, if you are a victim of ransomware, there’s nothing you can do. Luckily, from time to time police and cybersecurity companies take down command and control servers
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide