Skip to main content
26 June 2014The experts at Kaspersky Lab’s Global Research and Analysis Team have discovered evidence of a targeted attack against the clients of a large European bank
READ MORE
25 June 2014 Today, Kaspersky Lab published a new research report mapping a massive international infrastructure used to control ‘Remote Control System’ (RCS) malware implants, and identifying previously undiscovered mobile Trojans that work on both Android and...
READ MORE
19 June 2014The rate of targeted attacks reported within the Government & Defense sector was the highest rate reported in this year’s survey
READ MORE
16 June 2014Ten years ago, Kaspersky Lab reported the discovery of Cabir – the first ever worm designed to attack mobile phones
READ MORE
12 June 2014 Facebook remains the preferred target for cybercriminals who specialize in stealing social network accounts: according to Kaspersky Lab’s statistics, in Q1 2014 fake sites imitating Facebook accounted for 10.85% of all instances when the heuristic...
READ MORE
12 June 2014Although the Gameover Zeus botnet and Cryptolocker ransomware have been disrupted, it is still too early for a victory celebration
READ MORE
11 June 2014Kaspersky Lab’s analysts have stated that, although the operation of the Gameover Zeus botnet has been disrupted, it is too early to celebrate complete victory.
READ MORE
10 June 2014Passwords, PINs and other sensitive data could also fall into the hands of cybercriminals if public charging stations are used – in Brazil these publically available chargers may be malicious.
READ MORE
3 June 2014Kaspersky Lab warns that Brazil has some of the most creative and active criminals specializing in credit card cloning.
READ MORE
29 May 2014Kaspersky Lab analyzed the Internet search patterns of young users
READ MORE
28 May 2014Kaspersky Lab has made a host of unique statistical data available that shows the real-time picture of the cyberworld and its inhabitants
READ MORE
22 May 2014As Brazil makes its final preparations to host the FIFA World Cup 2014, which will kick off on June 12, cybercriminals are building up their scamming campaigns aimed at soccer (aka football) fans
READ MORE
20 May 2014How to protect against online gambling scams: expert advice
READ MORE
15 May 2014Fake antivirus programs are increasingly appearing in mobile app stores.
READ MORE
6 May 2014Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash software.
READ MORE
22 April 2014According to the ‘Financial cyber threats in 2013’ study carried out by Kaspersky Lab, financial malware targeting Bitcoin became extremely popular in 2013.
READ MORE
17 April 2014In December Kaspersky Lab published its threat forecast for 2014. Three months later, the experts found that all three of their ‘End user forecasts’ had already been confirmed.
READ MORE
9 April 2014According to the study ‘Financial cyber threats in 2013’ conducted by Kaspersky Lab, cybercriminals are increasingly trying to gain access to the online accounts of users
READ MORE
4 April 2014Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time.
READ MORE
1 April 2014To mark April Fools’ Day, Kaspersky Lab looks back at the “benign malware” which has occasionally spread over the World Wide Web
READ MORE
13 March 2014Experts from G-Data and BAE Systems recently released information about a persistent cyber espionage operation codenamed Turla (also referred to as Snake or Uroburos)
READ MORE
5 March 2014In recent months Kaspersky Lab experts have been closely monitoring so-called Darknet resources, mostly the Tor network. And one thing that is immediately obvious is that the cybercriminal element is growing
READ MORE
24 February 2014The experts at Kaspersky Lab have published the results of their analysis of the mobile threat landscape in 2013
READ MORE
12 February 2014Kaspersky Lab confirms hidden threat in BIOSes of popular laptops and warns that Absolute Computrace anti-theft software can be remotely hijacked
READ MORE