Switcher hacks Wi-Fi routers, switches DNS
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL
Last week, I was chatting with a colleague when our conversation shifted to how much she loves the “On this Day” update from Facebook, which lets her revisit memories from
Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
It feels good when something you created does better than expected. When we posted recently about the NoMoreRansom project, which started as a joint initiative of Europol, the Netherlands police,
It’s the most wonderful time of the year — families gearing up for the holiday season, bright-eyed shoppers making their lists and checking them twice…cybercriminals licking their chops and picking
A few years ago, a criminal gang in India was making easy money off tech-illiterate people in Europe, Australia, and Great Britain. They did quite well until they encountered Kaspersky
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
Facebook’s settings are a moving target. Over the past few years, the company has changed various settings several times, adding, moving, even removing options. Now it’s really easy to get
Over the past few weeks, teams from 19 universities in the US and UK competed in Kaspersky Lab’s Cybersecurity Case Study Competition, hosted by The Economist’s Which MBA? site. The
Public awareness of — and wariness about — Web privacy continues to grow. That should come as no surprise: These days, pervasive cybertracking affects everyone. In this article, the last
Do you remember where the term “virus” came from? Yes, I’m talking about biological viruses, after which IT security specialists named the computer programs that insert their own code into
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
The Internet is up to its ears in ads. They can overwhelm pages and make it hard to focus on the content. We recently explained how Internet ads work, and
This past weekend, November 26 and 27, people traveling on the San Francisco Municipal Railway were surprised to find out that they didn’t have to pay for their rides. Everyone