Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • IoT lottery: finding a perfectly secure connected device

    IoT lottery: finding a perfectly secure connected device

    Being enthusiastic shoppers just like many other people around the world, at Kaspersky Lab we are, however paranoid enough to look at any Internet of Things (IoT)-device with some concern, even when the price is favorable. So we randomly took several different connected devices and reviewed their security set up.

    More...
    See more | Go to post

  • Android commercial spyware

    Android commercial spyware

    There’s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools. In reality, however, these apps barely differ from spyware, with the exception perhaps of the installation method.

    More...
    See more | Go to post

  • Threat Predictions for Connected Life in 2018

    Threat Predictions for Connected Life in 2018

    Every year, Kaspersky Lab’s experts look at the main cyberthreats facing connected businesses over the coming 12 months, based on the trends seen during the year. For 2018, we decided to extract some top predictions that also have big implications for everyday connected life.

    More...
    See more | Go to post

  • Kaspersky Lab – Beyond Black Friday Threat Report, November 2017

    Kaspersky Lab – Beyond Black Friday Threat Report, November 2017

    This time of year is an ideal hunting ground for hackers, phishers and malware spreaders; disguising their attacks as offers too good to refuse, a concerned security message from your bank requiring urgent attention, a special rate discount from your credit card service, and more.

    More...
    See more | Go to post

  • Investigation Report for the September 2014 Equation malware detection incident in the US

    In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. To assist any independent investigators and all the people who have been asking us questions whether those allegations were true, we decided to conduct an internal investigation to attempt to answer a few questions we had related to the article and some others

    More...
    See more | Go to post

  • Threat Predictions for Connected Health in 2018

    Threat Predictions for Connected Health in 2018

    In 2017, Kaspersky Lab research revealed the extent to which medical information and patient data stored within the connected healthcare infrastructure is left unprotected and accessible online for any motivated cybercriminal to discover. This risk is heightened because cyber-villains increasingly understand the value of health information, its ready availability, and the willingness of medical facilities to pay to get it back.

    More...
    See more | Go to post

  • Threat Predictions for Automotive in 2018

    Threat Predictions for Automotive in 2018

    Remote fault diagnostics, telematics and connected infotainment significantly enhance driver safety and enjoyment, but they also present new challenges for the automotive sector as they turn vehicles into prime targets for cyberattack. The growing risk of a vehicle’s systems being infiltrated or having its safety, privacy and financial elements violated, requires manufacturers to understand and apply IT security.

    More...
    See more | Go to post

  • Kaspersky Security Bulletin: Threat Predictions for 2018

    Kaspersky Security Bulletin: Threat Predictions for 2018

    Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new event is an exciting new research avenue for us, as what were once theoretical problems find palpable expression in reality. On the other hand, as people with a heightened concern for the security posture of users at large, each event is a bigger catastrophe.

    More...
    See more | Go to post

  • Threat Predictions for Industrial Security in 2018

    Threat Predictions for Industrial Security in 2018

    2017 was one of the most intense in terms of incidents affecting the information security of industrial systems. Security researchers discovered and reported hundreds of new vulnerabilities, warned of new threat vectors in ICS and technological processes, provided data on accidental infections of industrial systems and detected targeted attacks.

    More...
    See more | Go to post

  • Threat Predictions for Financial Services and Fraud in 2018

    Threat Predictions for Financial Services and Fraud in 2018

    2018 will be a year of innovation in financial services as the pace of change in this space continues to accelerate. As more channels and new financial service offerings emerge, threats will diversify. Financial services will need to focus on omni-channel fraud prevention to successfully identify more fraud crossing from online accounts to newer channels.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Skygofree: Following in the footsteps of HackingTeam
    willie
    At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild. In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.

    More...
    16-01-2018, 14:52
  • Happy IR in the New Year!
    willie
    Endpoint anal In IR cases we use a very simple script that is uploaded to every Windows computer in the corporate network to collect logs, NTFS data, entries from the Windows registry and strings from the binary files to find out how exactly the attackers were moving through the network. It’s holiday season and it is our pleasure to share this script with you.

    More...
    28-12-2017, 20:53
  • Nhash: petty pranks with big finances
    willie
    In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on users’ computers. This time, we’d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.

    More...
    22-12-2017, 06:22
  • Travle aka PYLOT backdoor hits Russian-speaking targets
    willie
    At the end of September, Palo Alto released a report on Unit42 activity where they – among other things – talked about PYLOT malware. We have been detecting attacks that have employed the use of this backdoor since at least 2015 and refer to it as Travle. Coincidentally, KL was recently involved in an investigation of a successful attack where Travle was detected, during which we conducted a deep analysis of this malware.

    More...
    20-12-2017, 10:46
  • Jack of all trades
    willie
    Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi. This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.

    More...
    18-12-2017, 17:11
  • Kaspersky Security Bulletin. Overall statistics for 2017
    willie
    In 2017, Kaspersky Lab’s web antivirus detected 15 714 700 unique malicious objects (scripts, exploits, executable files, etc.) and 199 455 606 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab solutions detected and repelled 1 188 728 338 malicious attacks launched from online resources located in 206 countries all over the world.

    More...
    14-12-2017, 19:08
Working...
X