Mobile banking Trojans, explained
Everything you need to know about mobile banking Trojans and how to fight them.
901 articles
			
		Everything you need to know about mobile banking Trojans and how to fight them.
			
		One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
			
		Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
			
		How heuristic analysis and System Watcher work in Kaspersky Internet Security.
			
		Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
			
		Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
			
		What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
			
		Powerful chatbots can replace real-life communication — and take over the world.
			
		Another piece of ransomware bites the dust: Kaspersky Lab now offers a free decryption tool for the WildFire cryptor.
			
		Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.
			
		Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
			
		In this roundup, we talk about five true leaks and some lessons to be learned from them.
			
		Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
			
		When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
			
		How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
			
		Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
			
		Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
			
		An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
			
		Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
			
		Criminals are stealing money from freelancers — by offering them a job.
			
		Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!