Lottery scams for the digital age
True tales of rigged lotteries, stolen millions, and the investigations that brought the thieves down.
129 articles
True tales of rigged lotteries, stolen millions, and the investigations that brought the thieves down.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Yet another ZeuS variant is threatening businesses.
What happens when real cyber experts head to TV to stop cybercrime?
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life
We take a look at what happened in cybersecurity throughout 2015.
The Russian Mafia is a long-standing media staple in the West, portrayed with many myths, but reality is possibly surpassing all of them.
Kaspersky Lab’s quarterly IT Threat Evolution report is in and so is Kaspersky DDoS Intelligence Report for Q3 2015. Let’s take a look into what happened this last quarter.
An FBI representative speaking at the 2015 Boston Cyber Security Summit gave a piece of advice on ransomware which the San Francisco Chronicle called “disquieting”: he said it’s recommended victims
A botnet behind Dridex, a sophisticated banking malware stealing credentials of online bank accounts worldwide, are down.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
A huge state-of-art building on 18 Napier Road in Singapore is nestled among the green created by local flora and tropical climate, almost like a spaceship. As written on the