
Mobile beasts and where to find them — part two
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
212 articles
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
Many users of devices running Android are tempted to root them. Here we explain the good and bad sides of having superuser rights.
Embedded systems demand special protection from infections similar to WannaCry.
Researchers discovered a hack that affects 100 million Volkswagen cars. And the equipment needed costs just $40.
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Hacked medical equipment can cost patients a lot — their health or even their lives.