How to Stay One Step Ahead of Hackers
Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network. You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data […] more…Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those pieces of digital data you want to keep under lock and key on your smart phone. The apps store data such as logins and passwords, private photos, and keep them safe from hands of hackers, […] more…GravityRAT: The spy returns
In 2018, researchers at Cisco Talos published a post on the spyware GravityRAT, used to target the Indian armed forces. The Indian Computer Emergency Response Team (CERT-IN) first discovered the Trojan in 2017. Its creators are believed to be Pakistani hacker groups. According to our information, the campaign has been active since at least 2015, […] more…IT threat evolution Q3 2018. Statistics
These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. Q3 figures According to Kaspersky Security Network: Kaspersky Lab solutions blocked 947,027,517 attacks launched from online resources located in 203 countries. 246,695,333 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by […] more…Securing Your Devices from Mobile Malware
As the world has gone mobile, so too have the cybercriminals. With users now spending an average of four hours a day on multiple mobile devices that store mountains of sensitive information, it’s no wonder that mobile malware has become one of the most effective ways to capture our money and data. That’s probably why […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- Huawei is attempting to avoid US chip sanctions, trade body alleges
- Istio CVE-2019-14993 Remote Denial of Service Vulnerability
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- What do a hacker expo and cutting-edge research have in common? Amsterdam!
- Facebook Closes Disinformation Accounts Linked to French Military
- A week with the iPhone 5 on EE, the UK’s first 4G network
- CCC Hackers Sue German Government for Helping the NSA
- Meet ART: The New Super-Fast Android Runtime Google Has Been Working On In Secret For Over 2 Years
- Get your company started with Evernote for Business
- Finding & Fixing Google Blocklist Warnings