How to Stay One Step Ahead of Hackers
Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network. You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data […] more…Password managers remain an important security tool despite new vulnerability report
Security researchers have recently found flaws in several popular password managers that can allow attackers with access to a computer to retrieve passwords from its memory. While the vulnerabilities are real, protecting secrets in memory is an ongoing issue for the software industry, and experts have pointed out that there are much easier ways to […] more…CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files
We uncovered a new crypto-ransomware variant with new routines that include making encrypted files appear as if they were quarantined files. These “quarantined” files are appended by a *.VAULT file extension, an antivirus software service that keeps any deleted files for a certain period of time. Antivirus software typically quarantines files that may potentially cause further damage to […] more…Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […] more…Not so Hack-tastic: Cyber Scams Cost Banks, and You, Millions
This year may just be deemed the era of the cyber security breach, with scores of online attacks running up millions of dollars in damages to a number of financial institutions. The tactics used range from revenge-focused “hacktivism” to illicit credit card scandals—a variety of scams that emphasize just how important it is to use […] more…Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those pieces of digital data you want to keep under lock and key on your smart phone. The apps store data such as logins and passwords, private photos, and keep them safe from hands of hackers, […] more…Timeline: Hacks Related to Apple
The hacks related to Apple involve a lot of complexities. Let’s review the time line: February 1st: Twitter’s Director of Information Security, Bob Lord, posted “Keeping our users secure” on Twitter’s blog. On a Friday. The weekend of the NFL’s Super Bowl. Lord explained that Twitter had been hacked, and that 250,000 accounts have had […] more…What Are Browser Cookies and How Do I Manage Them?
As an avid internet surfer, you’ve most likely heard of cookies. No, we’re not talking about the ones filled with chocolate chips. We’re talking about the ones that allow you to log in to your favorite websites. Cookies may impact your online security, so check out these tips to manage them and keep your online […] more…Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely
If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet. Topping the several important things a new cryptocurrency investor needs to think about is security. Rightfully so. Cryptocurrency is indeed subject to all kinds of fraud, theft, and phishing attacks, just like the credentials and […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Sunburst backdoor – code overlaps with Kazuar
Introduction On December 13, 2020, FireEye published a blog post detailing a supply chain attack leveraging Orion IT, an infrastructure monitoring and management platform by SolarWinds. In parallel, Volexity published an article with their analysis of related attacks, attributed to an actor named “Dark Halo”. FireEye did not link this activity to any known actor; […] more…Dox, steal, reveal. Where does your personal data end up?
The technological shift that we have been experiencing for the last few decades is astounding, not least because of its social implications. Every year the online and offline spheres have become more and more connected and are now completely intertwined, leading to online actions having real consequences in the physical realm — both good and […] more…GravityRAT: The spy returns
In 2018, researchers at Cisco Talos published a post on the spyware GravityRAT, used to target the Indian armed forces. The Indian Computer Emergency Response Team (CERT-IN) first discovered the Trojan in 2017. Its creators are believed to be Pakistani hacker groups. According to our information, the campaign has been active since at least 2015, […] more…McAfee ATR Aids Police in Arrest of the Rubella and Dryad Office Macro Builder Suspect
Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal sender tries to entice a victim to open the document and enable the embedded macro. This macro then proceeds to pull in a whole array of nastiness and infect a victim’s machine. […] more…A predatory tale: Who’s afraid of the thief?
In mid-February, Kaspersky Lab received a request for incident response from one of its clients. The individual who initially reported the issue to our client refused to disclose the origin of the indicator that they shared. What we do know is that it was a screenshot from one of the client’s internal computers taken on […] more…IT threat evolution Q3 2018. Statistics
These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. Q3 figures According to Kaspersky Security Network: Kaspersky Lab solutions blocked 947,027,517 attacks launched from online resources located in 203 countries. 246,695,333 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by […] more…More information
- LockBit Ransomware Gang Resurfaces With New Leak Site
- Researcher Earns $10,000 for Yahoo! Mail Flaw
- Microsoft fixes critical flaws with Patch Tuesday updates
- South Korean nuclear reactors hit by cyber attack
- Android, ChromeOS, and Google’s cloudy vision for a connected future
- Dridex botnet taken down, multi-million bank fraud suspect arrested
- Over 100 arrested in FBI Blackshades RAT raids
- Researcher Details Google Maps Vulnerability That Earned Him $10,000
- Mingis on Tech: How linguistics can help catch cyberattackers
- Malware infection suspected at ISC, providers of the BIND DNS server software