Security Week 37: Bug-bugzilla, Carbanak is back, and С&C gone fishing
In the new installment of our explosive hit series “Infosec news”: The breach of Bugzilla serves a harsh reminder of the necessity to make passwords BOTH strong and unique. The
175 articles
In the new installment of our explosive hit series “Infosec news”: The breach of Bugzilla serves a harsh reminder of the necessity to make passwords BOTH strong and unique. The
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more
Security experts often mention exploits as one of the most serious problems with data and systems safety; although it’s not always clear what the difference is between exploits and the
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
The problem of ransomware isn’t getting better. Recent examples of wide-spread ransomware attacks, including CoinVault, CryptoLocker, and others indicate that cybercriminals are increasing their use of these types of attacks.
Cybercriminals are learning from each other. Take TeslaCrypt, for example. It is a relatively new family of ransomware; its samples were first detected in February 2015. The notable feature of
You already know that your game accounts can attract cybercriminals just like the banking credentials of your parents. The Internet can be a dangerous place for those who don’t care about security.
So you think hackers and cyberspies are something you only see at the cinema? Think again! The Internet is crawling with weirdos and criminals who are just looking for a
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
he Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor
In most cases, if you are a victim of ransomware, there’s nothing you can do. Luckily, from time to time police and cybersecurity companies take down command and control servers
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.