Operation Triangulation: talk on 37С3
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
191 articles
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Bitcoin wallets created on online platforms between 2011 and 2015 may be insecure due to a vulnerability in the library for key generation.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Four major studies presented by our experts at the SAS 2023 international conference.
We take an in-depth look at securing and configuring containerization systems.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
How to protect a company’s reputation from illegal use of its name on the internet.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.