![](https://webcf.waybackmachine.org/web/20220516174513/https://media.kasperskydaily.com/wp-content/uploads/sites/92/2020/06/08155644/fake-djvu-ransomware-decryptor-featured-700x460.jpg)
Encrypting the encrypted: Zorab Trojan in STOP decryptor
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
97 articles
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
The mass shift to working from home has made ransomware an even greater threat.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Tools and approaches to help you get some online privacy.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
When it comes to information security, we’re seeing the same mistakes over and over again.
We explain how not to drown in the stream of annoying browser push notifications — or even kiss them goodbye.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.