Where have all those malware epidemics gone?
It’s been years since we’ve last heard of any large worm epidemics. Does it really mean that malware epidemics have gone away for good?
Musician and technology enthusiast.
356 articles
It’s been years since we’ve last heard of any large worm epidemics. Does it really mean that malware epidemics have gone away for good?
Kaspersky Lab’s recent survey surprisingly found that e-commerce, online retailers and financial service providers are not just the biggest sources of stolen financial data, but also feel just a bit too lax about security. However, this has some severe implications.
A curious story about a cyber-investigation of fraudulent activities, which our GERT group had recently conducted on behalf of one of the company’s clients. The attackers were quite thoughtful, but not good enough.
A large number of logins and passwords to accounts in several free email services – Mail.ru, Yandex and Gmail.com – had been leaked. Once again, passwords prove to provide insufficient protection. What does it mean for businesses?
IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.
Small businesses are unwilling to invest in security solutions – often because they don’t think there are any – designed specifically for their needs. But such solutions do exist.
Kaspersky Endpoint Security proved to be an undisputed champion in Dennis Technology Labs’ testing in Q2, 2014.
Kaspersky Lab launches Beta Testing of a new version of its enterprise security solution. Service Pack 1 for Kaspersky Endpoint Security 10 for Windows (the software for endpoints) and Kaspersky
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
The latest survey by Kaspersky Lab and B2B International shows a clear demand by users for extra security from banks and payment services.
Can we beat software vulnerabilities? It is not possible to do so completely, but there are ways to mend the issue.
Windows XP’s longevity is fascinating – and terrifying from the security point of view. The latest survey shows it’s still around – over 16% of KSN users still use Windows XP, but it is also clear that its epoch is near the end.
A recent survey shows that IT professionals have a very uneven understanding of how to protect their virtualization environments. Baseline awareness exists, but there’s a Roman Colosseum of room for improvement.
High-tech crime sounds impressive, but actually the tools are the only somewhat high-tech part, the goals almost never are.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
According to a recent Kaspersky Lab and B2B International survey, 21% manufacturing businesses lost their intellectual property to security breaches. In most cases malware was the cause, although other problems were named.
Four years after the discovery of the Stuxnet worm, the primary vulnerability it had been exploiting is still around. This is mainly the problem of poorly maintained Windows XP PCs and servers, most likely inhabited by worms. In the interconnected world a neglected PC or a server is a possible problem for many people.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
Few companies are interested in protecting their users’ endpoint devices, even though it’s one of the most vulnerable points in the financial transaction chain. At the same time, users expect payment operators to reimburse their funds in instances of successful fraud.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.