![](https://webcf.waybackmachine.org/web/20211026233837/https://media.kasperskydaily.com/wp-content/uploads/sites/37/2021/10/26113144/uaparser-js-infected-versions-featured-700x460.jpg)
Popular JavaScript package UAParser.js infected with malware
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
117 articles
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Should you contact authorities about ransomware?
The Galactic Empire’s heirs analyzed for cybersecurity.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
Why the computers in human resources are especially vulnerable, and how to protect them.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.