How to Stay One Step Ahead of Hackers
Whether using the internet for play or work, you want to spend your time online enjoying the peace of mind that comes with having a secure network. You don’t want to contend with someone taking your personal data — whether it’s credit card information, passwords, or bank account details — via malware or a data […] more…Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those pieces of digital data you want to keep under lock and key on your smart phone. The apps store data such as logins and passwords, private photos, and keep them safe from hands of hackers, […] more…GravityRAT: The spy returns
In 2018, researchers at Cisco Talos published a post on the spyware GravityRAT, used to target the Indian armed forces. The Indian Computer Emergency Response Team (CERT-IN) first discovered the Trojan in 2017. Its creators are believed to be Pakistani hacker groups. According to our information, the campaign has been active since at least 2015, […] more…IT threat evolution Q3 2018. Statistics
These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. Q3 figures According to Kaspersky Security Network: Kaspersky Lab solutions blocked 947,027,517 attacks launched from online resources located in 203 countries. 246,695,333 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by […] more…Securing Your Devices from Mobile Malware
As the world has gone mobile, so too have the cybercriminals. With users now spending an average of four hours a day on multiple mobile devices that store mountains of sensitive information, it’s no wonder that mobile malware has become one of the most effective ways to capture our money and data. That’s probably why […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- BlackBerry Sues Facebook Over Messaging Apps
- Net Neutrality comments “deeply corrupted” – NY Attorney General
- Google staff knew for years about Street View data breach
- AMD claims Windows 10 will launch by late July, and that feels very soon
- Apple Watch steals show from biggest iPhone ever
- Google Improves Chrome Protections Against Use-After-Free Bug Exploitation
- Microsoft to Make EMET Native to Windows 10
- WebMail Web Server Upgrade – November 12
- Snowden, one year on, and it’s still not 1984
- Microsoft Patches New Windows ‘Ping of Death’ Vulnerability