Dangerous holy water
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
1073 articles
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
Ginp banking Trojan uses information about people infected with coronavirus as bait to lure Android users into giving away credit card data.
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
What is the story with Microsoft, Kaspersky and KB 4524244 security update all about?
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Why stalkerware is a problem not only for targets, but also for security vendors – and what we’re doing to fix it.
With more than 2.5 billion gamers around the world, it’s no wonder cheats, hacks, and game modifications have spawned a multimillion dollar industry.
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
A pixel-art infographic with 30 years of information security developments, from the Cascade virus to the most recent days.
Buzzing the White House, paralyzing airports, crashing into planes and power lines — we highlight the dangers of drones.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
This year’s Kaspersky NEXT event centred around AI, gender equality, and social robotics.
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity