
Antivirus fundamentals: Viruses, signatures, disinfection
We talk and talk (and talk) about how to behave — and even how to survive — in the digital world. And we hope it’s not in vain, that our
164 articles
We talk and talk (and talk) about how to behave — and even how to survive — in the digital world. And we hope it’s not in vain, that our
Over the past few days, there has been some chatter surrounding Spotify based on a user’s post in the company’s community forum: There’s something pretty alarming going on right now
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
Here is a scenario for you: You are walking around, catching Pokémon, getting fresh air, people-watching, taking Fido out to do his business, when something catches your eye. It’s a
When ransomware hits, it’s natural to wonder if it might be worth paying the ransom to get your electronic life back with a minimum of hassle. At Kaspersky Lab, we
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading rapidly but even picking up secondary characteristics. Take Cerber, ransomware first spotted in the wild back in February
When you are sick, you head to the doctor. However, when your computer is suffering from an infection, you probably shouldn’t ask for your doctor’s advice. At Kaspersky Lab, we
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
At the tail end of last month, we announced that our researchers had developed a decryption tool to beat CryptXXX ransomware and help the victims get their files back for
Yesterday one of 2ch’s users attracted the attention of Russian media. This man streamed video from the hacked computers on YouTube. The anonymous user turned these sessions into a real
Similar to other successful business sharks, cybercriminals are in constant search of new markets. They carry out experiments, change target audiences and provide feedback to the victims — all to
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
The morning of November 24, 2014 is engrained into the collective memories of Sony Pictures Entertainment employees. On that day, an unknown cybergang hacked the company’s server, leaked a slew
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no