Types Of Hackers
According to the EC-Council’s Certified Ethical Hacking 9 certification hackers can be classified into 8 categories 1. Black Hats Individuals with extraordinary computing skills, resorting to malicious or destructive activities. These people are also known as crackers. 2. White Hats Individuals who profess hacking skills and use them for defensive purposes. They are also known as […] more…
Biggest financial mistakes in your 20’s
1. Buying a new car Buying a new car isn’t the end of the world, but it will significantly slow down your path to financial independence. By financing a car with a loan, you are paying for something that depreciates in value every single year, while your payments stay the same. A car’s value immediately […] more…
Password Safe Review
Features Password Safe is a freeware locally stored password manager. Passwords that are stored are encrypted with the twofish algorithm with a 256 bit key. The GUI is simple but robustly packed with features. Ease Of Use The interface is clean and simple, allowing people of all ages to use the manager. To create a new password […] more…
Blog feedback survey
Create your own user feedback survey more…
Massive Marriott Data Breach 500k affected
The Impact Of The Breach The Marriott Hotel Group suggests that up to 500,000 of its customers may have been compromised. This is not the first, or the last major data breach. Hackers obtained birthdays, email addresses, passport numbers, loyalty account numbers of customers. Marriott’s Response The company has put up a website for those affected by […] more…
Massive Marriott Data Breach 500 million affected
The Impact Of The Breach The Marriott Hotel Group suggests that up to 500 million of its customers may have been compromised. This is not the first, or the last major data breach. Hackers obtained birthdays, email addresses, passport numbers, loyalty account numbers of customers. Marriott’s Response The company has put up a website for those affected […] more…
Choosing A Mechanical Switch For Your Keyboard
How to choose a mechanical switch? When choosing a mechanical switch for your keyboard, there are many factors that influence your decision. How large do want your keyboard, do you want RGB lighting, what the key feel is, can you program macro functions, quality of the cable, price range, etc. To simplify the search there […] more…
Very Simple Tips To Increase WordPress Security
Whenever you run a WordPress website you need to think about security. It is your responsibility to be sure that the site is properly protected. We are talking about an open source platform that gives you a world of opportunities. This is a great thing but it can also be a problem since it opens […] more…
How do file partner programs work?
It’s easy to notice if you’ve fallen victim to an advertising partner program: the system has new apps that you didn’t install, ad pages spontaneously open in the browser, ads appear on sites where they never used to, and so on. If you notice these symptoms on your computer, and in the list of installed […] more…
Attacks on industrial enterprises using RMS and TeamViewer
Main facts Kaspersky Lab ICS CERT has identified a new wave of phishing emails with malicious attachments targeting primarily companies and organizations that are, in one way or another, associated with industrial production. The phishing emails are disguised as legitimate commercial offers and are sent mainly to industrial companies located in Russia. The content of […] more…
A mining multitool
Recently, an interesting miner implementation appeared on Kaspersky Lab’s radar. The malware, which we dubbed PowerGhost, is capable of stealthily establishing itself in a system and spreading across large corporate networks infecting both workstations and servers. This type of hidden consolidation is typical of miners: the more machines that get infected and the longer they […] more…
A study of car sharing apps
The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. The statistics appear to back up this claim: for example, in 2017 Moscow saw the car sharing fleet, the number of active users and the number of trips they made almost double. This […] more…
DDoS attacks in Q2 2018
News overview Q2 2018 news includes: non-standard use of old vulnerabilities, new botnets, the cutthroat world of cryptocurrencies, a high-profile DDoS attack (or not) with a political subtext, the slashdot effect, some half-baked attempts at activism, and a handful arrests. But first things first. Knowing what we know about the devastating consequences of DDoS attacks, […] more…
Calisto Trojan for macOS
An interesting aspect of studying a particular piece of malware is tracing its evolution and observing how the creators gradually add new monetization or entrenchment techniques. Also of interest are developmental prototypes that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that […] more…
The return of Fantomas, or how we deciphered Cryakl
In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys to our experts, who used them to update the free RakhniDecryptor tool for recovering files encrypted by the malware. The ransomware, which for years had raged across Russia (and elsewhere through […] more…
APT Trends Report Q2 2018
In the second quarter of 2017, Kaspersky Lab’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports, in an effort to make the public aware of the research we have been conducting. This report serves as the latest installment, focusing on the relevant activities that we observed during […] more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy