
Ded Cryptor: Greedy ransomware with open-source roots
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
96 articles
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Kaspersky’s free WindowsUnlocker utility brings your locker-infected computer back and gets rid of the malware.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.