Rakhni Trojan: To encrypt and to mine
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
99 articles
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
This new version of SynAck ransomware uses sophisticated evasion techniques.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Love the convenience and features of Dropbox but need better security? Here are some alternatives.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
Encrypted messaging comes to Facebook Messenger for Android and iOS
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
Hacked medical equipment can cost patients a lot — their health or even their lives.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
WhatsApp has just adopted the end-to-end encryption based on Signal Protocol. Kaspersky Daily explains, why it’s the good news and what are the real benefits for all of us.
Categories: Featured, News, Security
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.