Trojans stealing porn site accounts
Adult websites are often seen as a security threat, but few know that Trojans could be after their porn site accounts.
3885 articles
Adult websites are often seen as a security threat, but few know that Trojans could be after their porn site accounts.
The UK calls for Facebook regulation, lightsaber duels, Nike’s smart shoes, license plate emoji, and more, in the Kaspersky Lab Transatlantic Cable podcast.
Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the “ATM game.”
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
Too many ads on your computer lately? Malicious Chrome extensions might be to blame.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
In this episode of the Kaspersky Lab podcast, the team takes a look at hacks in OKCupid, the acquisition of Eero, and connected refrigerators.
Artificial intelligence assists judges, police officers, and doctors. But what guides the decision-making process?
A preview of the 2019 Security Analyst Summit from Kaspersky Lab with Sergey Lozhkin and Jeff Esposito.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
Using only publicly available sources, how much can you find out about someone?
Things you should know about your home Internet connection: How to be sure it is safe and waste no time calling tech support.
Jeff and David take a look at a recalled smart watch in the EU, faulty webcam covers from the NSA, changes in iOS, and more.
In this Security Analyst Summit preview, Jeff talks with Vitaly Kamluk of Kaspersky Lab’s Global Research and Analysis team.
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
When you’re ready to leave the privacy fever dream that is Facebook, make sure you have everything before you lock the door on your way out.
Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.