Mission Made Possible: The Open Integration Time Machine
A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that label. Unfortunately, if you’re like me, you feel more like Wile. E. […] more…DDoS attacks in Q4 2016
News Overview Without doubt, 2016 was the year of Distributed Denial of Service (DDoS) with major disruptions in terms of technology, attack scale and impact on our daily life. In fact, the year ended with massive DDoS attacks unseen before, leveraging Mirai botnet technology, whose first appearance was covered in our last DDoS Intelligence Report. […] more…Trends: Adult Cyberbulling is No Laughing Matter
This past year is one for the digital record books. As incredible as it sounds, adults — not those impulsive, reckless kids — proved to be the more prolific bullies online. And, one glance at the latest headlines, and it’s clear, a digital cease-fire is nowhere in sight. It seems every day we witness adult […] more…Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages we send to one another, interacts with the internet in some fashion—and sometimes in ways that aren’t exactly secure. In fact, risky interactions with the Web can even extend to the homes and family. So, what impact (good […] more…Expensive free apps
This post is the result of collaboration between Elevenpaths (Telefónica Cyber Security Unit) and Kaspersky Lab. Both companies have used their own expertise, researchers and tools, such as Tacyt (an innovative tool for the monitoring and analysis of mobile threats) and GReAT’s internal tools and resources. Big Brother and Google Play Fraudulent apps trying to […] more…CTO Insights: The General Data Protection Regulation (GDPR) Is Coming, What Now?
Based on the incidents we saw in 2016, I recommend that organizations enter 2017 with caution. From the growth of Business Email Compromise (BEC) attacks to cybercriminals using more effective ways to exploit Internet of Things (IoT) devices, these security issues should serve as a reminder for businesses and individuals to be more vigilant. One […] more…Help! My Child Just Got His First Phone, Now What?
Q: We held off as long as we could but finally decided to give our child a smartphone for Christmas. He is 11 and our oldest. I can already feel the shift in our home and in his attitude. Do you have any tips for newbies (both parents and kids) just stepping into this world? […] more…The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that you could miss the daylight in the blink of an eye. At the same time, we try to stay positive and stick to our resolutions for the new year. The common promises to eat better, […] more…Notes from HITCON Pacific 2016
Hacks in Taiwan Conference (HITCON) Pacific 2016 was held in Taipei city, Taiwan from the 27th of November to the 3rd of December this year. The concept of this event is about “The Fifth Domain: Cyber | Homeland Security”. This HITCON Pacific 2016 is more formal event than HITCON Community 2016 which we attended last […] more…Identity verification: The New Turing Test
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Have you seen the movie Ex-Machina? It’s a fascinating journey through the life of a reclusive Silicon Valley billionaire, and examines artificial intelligence (“AI”) as manifested in a very engaging robot. The plot […] more…Fake Apps Take Advantage of Super Mario Run Release
Earlier this year, we talked about how cybercriminals took advantage of the popularity of Pokemon Go to launch their own malicious apps. As 2016 comes to a close, we observe the same thing happening to another of Nintendo’s game properties: Super Mario. The Super Mario franchise has been a key part of Nintendo’s video game business, with multiple title […] more…Mobile Ransomware: How to Protect Against It
In our previous post, we looked at how malware can lock devices, as well as the scare tactics used to convince victims to pay the ransom. Now that we know what bad guys can do, we’ll discuss the detection and mitigation techniques that security vendors can use to stop them. By sharing these details with other […] more…Mobile Ransomware: Pocket-Sized Badness
A few weeks ago, I spoke at Black Hat Europe 2016 on Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game. While watching mobile ransomware from April 2015 to April 2016, I noticed a big spike in the number of Android ransomware samples. During that year, the number of Android ransomware increased by […] more…2017 security predictions
From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election — 2016’s been a hell of a year in cybersecurity, and it’s not over yet. There’s no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to […] more…Kaspersky Lab Black Friday Threat Overview 2016
Download the PDF Introduction The Internet has changed forever how people shop. By 2018, around one in five of the world’s population will shop online; with ever more people doing so on a mobile device rather than a computer. In fact, it is estimated that by the end of 2017, 60% of e-commerce will come […] more…Spam and phishing in Q3 2016
Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter, this figure once again increased significantly. According to KSN data, in Q3 2016 the number of email antivirus detections totaled 73,066,751. Most malicious attachments contained Trojan downloaders that […] more…More information
- Microsoft Windows Essentials CVE-2013-0096 URI Handling Information Disclosure Vulnerability
- Security Validation Firm Pentera Banks $60M Series D
- Travelex currency exchange is offline following a malware attack
- 1,300 Malicious Packages Found in Popular npm JavaScript Package Manager
- Fortnite game developer Epic Games allegedly hacked
- New MacOS Malware Linked to North Korean Hackers
- California sues Delta Airlines for lack of mobile app privacy policy
- XSS Flaw Exposed eBay Users to Phishing Attacks
- Defendant claims she live-streamed rape to record evidence of assault
- Hackers To Manage Your Apple ID, If Caught From Phishing Bait