The Big Four Banking Trojans
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
216 articles
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
In news that has been making the rounds on various forums since mid-August, analysis conducted by independent IT security research firm MRG Effitas indicates that very few security companies can
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
The cyber threat landscape is constantly evolving and keeping up with those changes is an intense project. Kaspersky Lab has a team of research experts who are relentless in sniffing
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
Everyone knows you should have antivirus applications running on your work and personal computers, but far fewer people take seriously the threat of malware attacks to their mobile devices –
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.