
Trending cyberthreats at the Olympic Games
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
866 articles
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
Securelist just released a new cyberespionage campaign alert, code-named “Operation Daybreak.”
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.
Check this out to know if you want to fall for one of the latest Facebook scams
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.