Pig in a poke: smartphone adware
Our support team continues to receive more and more requests from users complaining about intrusive ads on their smartphones from unknown sources. In some cases, the solution is quite simple. In others, the task is far harder: the adware plants itself in the system partition, and trying to get rid of it can lead to […] more…OPC UA security analysis
This paper discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. In publishing this material, we hope to draw the attention of vendors that develop software for industrial automation systems and the industrial internet of things to problems associated with using such widely available technologies, which turned out to […] more…The Last Key on The Ring – Server Solutions to Ransomware
This entry is the last part of a four-part blog series discussing the different techniques ransomware uses to affect users and organizations. These techniques show that the best way to mitigate the risks brought about by this threat is to implement multiple layers of protection in different aspects of an enterprise network: from the gateway, […] more…IT threat evolution in Q2 2016. Statistics
Download the full report (PDF) All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide participate […] more…Trend Micro Uncovers 14 Critical Vulnerabilities in 2014 So Far
Exploits are frequently used in targeted attacks to stealthily infect systems. These exploits do not have to target newly discovered or zero-day vulnerabilities; for example, CVE-2013-2551 (a vulnerability in Internet Explorer) is still being targeted in 2014. However, zero-day exploits are still a serious threat as these can catch all parties off-guard, including security vendors. Zero-days take advantage […] more…More information
- Surveillance reform measure blocked in the wake of Orlando killings
- Facebook tests Snapchat-like vanishing act for posts
- U.S., China cyber group holds first talks since September pact
- Former Employee Admits Hacking, Damaging Cisco Systems
- Dutch hackers discover iOS exploit that may be present in iPhone 5
- Microsoft Jet Database Engine MDB File Parsing Remote Buffer Overflow Vulnerability
- June Retrial Date Set for Ex-CIA Engineer in Leak Case
- New FrameworkPOS Campaign Gains Momentum
- Discovery Of ‘Reset’ Button For Body Clocks Could Help Us Deal With Jet Lag
- Threatening to post a sex tape on Facebook isn’t a crime, US court rules