CosmicStrand: a UEFI rootkit
Our researchers examined a new version of the CosmicStrand rootkit, which they…
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains.…
Steam on the firing line: how cybercriminals steal gamers’ Steam accounts
Hackers are attracted by any web-resource where large amounts of money changes…
Kaspersky Lab’s utility decrypts files encrypted by TeslaCrypt ransomware
As we’ve mentioned earlier, the creators of TeslaCrypt, the constantly evolving trojan-cryptor,…
Criminals target Pokémon Go
I remember when Pokémon came out on the Nintendo Gameboy. It was…
Svpeng.q Trojan infects Android devices from Google AdSense
If you don’t go to suspicious sites, malware can’t get you —…
7 problems with the ATMs’ security discussed at #theSAS2016
Automated teller machines (ATM) have always a been a big target for…
2016 Stat: 75% of ransomware comes from Russian-speaking criminal underground
The annual RSA conference will often overwhelm the average attendee. Between the…
Poseidon — a custom-tailored malware boutique unveiled at #theSAS2016
Long gone are the days when hackers would make malware just for…
The Ransomware Plague of 2016
Cryptography and ransom have roots deep in human history. However, only in…