SynAck ransomware: The doppelgängster
This new version of SynAck ransomware uses sophisticated evasion techniques.
64 articles
This new version of SynAck ransomware uses sophisticated evasion techniques.
What is a cryptocurrency wallet, and how do you choose which one suits you best?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
Bad Rabbit: A new ransomware epidemic is on the rise
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
How facial recognition works in the new Apple iPhone X —and is it secure enough for you to usetrust?
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Adware found on 250 million computers spies on users and can install other software.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
How messages with confirmation codes from banks are intercepted and what can you do to protect yourself.
What makes the self-replicating encryptor WannaCry so dangerous and how to prevent infection.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Do you think that you have nothing to hack whatsoever? Bad news, guys: everyone has something hackable!