Scrimping on software could blow a hole in your budget
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
410 articles
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Attackers pretending to be acquaintances asking for money — the story is old, the approaches new. We show you how to avoid the e-bait.
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
A new ransomware outbreak is happening right now. Here’s what we know so far and what you can do to protect yourself from the threat.