The Official Blog from Kaspersky Lab covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.
Cryptocurrency scams seem to be gaining momentum by the day. Hard on the heels of scammers tricking Discord users by offering nonexistent coins on fake exchanges, inventing stories about lucky winners on fake news sites, and simulating helicopter money, a new scheme is exploiting Lightshot’s screen-sharing tool to get money from overly curious cryptoinvestors....
1d
We always recommend downloading apps from official stores only, to reduce the likelihood of installing malware. However, unofficial stores not only host malicious apps, but they might not be safe at all. Following a recent investigation, we are sorry to report that APKPure, a popular alternative source of Android apps, was Trojanized and has been distributing...
4d
Employees who receive external e-mails typically receive information about which files are potentially dangerous. For example, EXE files are considered unsafe by default, as are DOCX and XLSX files, which can contain malicious macros. Text files, on the other hand, are generally considered harmless by design, because they cannot contain anything other...
5d
For this episode of the Kaspersky Transatlantic Cable podcast, I am joined by two of my colleagues from our Global Research and Analysis Team (GReAT). Last week, Dmitry Bestuzhev and Fabio Assolini hosted a webinar on the threat landscape in the financial sector. During our conversation, we touch on the state of financial threats, how COVID-19 has...
6d
If you follow information security, you have probably heard a lot about ransomware in recent years. You may even have had the misfortune of being on the receiving end of an attack. It is perhaps no exaggeration to describe ransomware as the most dangerous malware of our time. But did you know that such malicious programs have been around for more than...
6d
In the past few years, cybercriminals have changed tack considerably. Until just a few years ago, they typically sent out Trojans en masse and waited quietly for someone to pay up, knowing full well that most targets would ignore the demand. Now they appear to have adopted a different approach, becoming more client-centric, so to speak. Attackers have...
2w
Unknown attackers recently attempted to carry out a large-scale supply-chain attack by introducing malicious code to the official PHP GIT repository. If the developers hadn’t noticed the backdoor in time, it could have ended up on many Web servers and led to the largest supply-chain attack in history. What happened with PHP The programmers who develop...
2w
A few months ago, Apple unveiled three series of computers powered by its own M1 chip, designed to replace Intel’s processors. The chips are notable for being based on the ARM architecture instead of the x86 architecture traditionally used in personal computers. In essence, the Apple M1 is a direct relative of the iPhone and iPad processors. If everything...
2w
This week on the Kaspersky Transatlantic Cable podcast, Dave and I focus on crime — meaning everything from dumb criminals to statistics and ransomware. The first story we look at travels from Italy to the Dominican Republic and back again. In this case, we have a mafia member who was on the run from Italian law enforcement and living in the Caribbean....
2w
Roughly a year ago, the COVID-19 pandemic and its lockdowns and self-isolation regimens turned our homes into offices and classrooms. The new work format has benefits, but it’s also brought problems, not the least of which is noise. In that respect, remote workers find themselves under attack from all sides. Even at the best of times a neighbor with...
3w
Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader