Roaming Mantis dabbles in mining and phishing multilingually
...code of the landing page, we also discovered a new feature: web mining via a special script executed in the browser. More details about web miners can be found in... more…Kaspersky Security Bulletin 2018. Top security stories
...in June that they had started a new campaign with a different geographical distribution and using new themes. Our telemetry, and the characteristics of the spear-phishing documents we analysed, indicated... more…APT review of the year
...cases where this tool was used can be considered a subset of activity in its own right. We saw different improvements for Zebrocy’s subset, including a new custom collector/downloader, new... more…IT threat evolution in Q1 2016
...to arrange new attacks continued in 2016. The attack was unique because of the damage it caused – the hackers managed to disable the power distribution system in Western Ukraine,... more…APT Trends Report Q2 2018
...reports or request more information on a specific report are encouraged to contact: intelreports@kaspersky.com. Remarkable new findings We are always interested in analyzing new techniques used by existing groups, or... more…Attack on Zygote: a new twist in the evolution of mobile threats
...products The owners of the Trojans described above, such as Leech, Ztorg, Gorpo (as well as the new malware family Trojan.AndroidOS.Iop) are working together. Devices infected by these malicious programs... more…A New McAfee, A New Posture: Staying Agile While Still Going Big
...Our culture has an edge to it. We’re not afraid to try new things. As of right now, we’re “the new McAfee” too. Put all of that together and... more…A New Standard for Security at New Standard Corporation
...From the latches on the toolbox in your garage to componentry in gigantic earth movers, New Standard Corporation provides Original Equipment Manufacturer components, assemblies, and related services for... more…A New Security Age Needs a New Approach to Security
...computers and websites to newly internet-connected devices like refrigerators. But with these new devices comes new challenges – and new security strategy must emerge as a result. At first, consumers... more…Windows 10: What’s New in the Security System
...Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target... more…Mobile malware evolution 2015
...The year in figures In 2015, Kaspersky Lab detected the following: 2,961,727 malicious installation packages 884,774 new malicious mobile programs – a threefold increase from the previous year... more…New Andariel Reconnaissance Tactics Hint At Next Targets
...recent example is the Andariel Group, a known branch of the notorious Lazarus Group. Last month we tracked new scouting techniques coming from Andariel, which were used mainly against South... more…PlugX: New Tool For a Not So New Campaign
...Earlier this year, a new breed of Remote Access Tool (RAT) called Plugx (also known as Korplug) surfaced in the wild. PlugX, reportedly used on limited targeted attacks, is... more…New WannaCry-Mimicking SLocker Abuses QQ Services
...by Lorin Wu Trend Micro researchers detected a new SLocker variant that mimics the GUI of the WannaCry crypto-ransomware on the Android platform. Detected as ANDROIDOS_SLOCKER.OPSCB, this new SLocker... more…Same Old yet Brand-new: New File Types Emerge in Malware Spam Attachments
...potential victims earlier this year. .PDF Files The use of .PDF files to distribute malware is not something new. In fact, we saw a malicious spam campaign that used .PDF... more…CVE-2015-2545: overview of current threats
...China and India. This group was the first to exploit the CVE-2015-2545 vulnerability. After the vulnerability was corrected with Microsoft updates in September and November 2015, no new Platinum attacks... more…Kam dál?
- Firefox sneaks out an “inbetweener” update, with security improvements rather than fixes
- UK police target script kiddies, teenage hackers
- Yahoo fixes password-pilfering bug, explains who’s at risk
- Amazon reset user passwords to protect accounts
- Upgrade to Friends of Penn State (FPS) Service
- The Risks of Public Wi-Fi and How to Close the Security Gap
- Google announces Pwnium 2, raises prize money for Chrome hack to $2m
- Long-awaited Blackphone tablet may emerge at MWC
- NSA collected 56,000 US emails a year
- New eLion Adviser