Virus can inflict physical harm onto a PC: myth or truth?
In fact, it’s the one of the most widely believed myths in…
Security Week 38: Cisco routers under attack, bug in AirDrop, CoinVault cryptohawkers aressted
“Three billion human lives ended on August 29, 1997. The survivors of…
Naikon APT steals geopolitical data from the South China Sea
The Chinese-language Naikon advanced persistent threat group is targeting military, government and…
How Kaspersky Internet Security protects from ransomware
Ransomware is a kind of malware that steals users’ files and exacts…
Multi-stage phishing that starts with real links
Recently Kaspersky Lab experts have found a sly method that allows fraudsters…
TeslaCrypt 2.0 ransomware improved version
Cybercriminals are learning from each other. Take TeslaCrypt, for example. It is…
Kaspersky Lab expert Andrey Pozhogin answers questions about ransomware
The problem of ransomware isn’t getting better. Recent examples of wide-spread ransomware…
Explaining what exploits are and why they are so scary
Security experts often mention exploits as one of the most serious problems…
95% of Android phones can be hacked with one just MMS
The most scandalous threat is tickling the nerves of Android phones owners:…
DEF CON 23: Tell me who you are and I will tell you your lock screen pattern
The predictability of human beings can barely be overestimated. This predictability can…