30+ essential facts about Apple in the enterprise
Apple-in-the-enterprise company Jamf officially became a public company with its IPO today. I’ll be back tomorrow with an interview about that means. Meanwhile, the following statistics help illustrate why now is the time for employee choice – and Apple – in the enterprise. (Apple’s acquisition of Fleetsmith also reflects the changing times.) 30+ essential Apple in […] more…Devices and Distancing: What Digital Data Says About Life From Home
Devices and Distancing: What Digital Data Says About Life From Home With millions of us keeping life closer to home in these past months, what can our devices and apps tell us about how we’ve passed that time? Plenty. Usage stats, location data, app downloads, and daily active users, all drawn from anonymized data, are […] more…New Insights From McAfee’s Survey Around Remote Work
The last few months have brought about a lot of change for all of us. Due to social distancing, companies across the world saw a huge increase in the number of people working remotely over the last few months. So as countries now start to relax social distancing and organizations consider shifting back to previous in-office work […] more…The Future of Work: How Technology & the WFH Landscape Are Making an Impact
Over the past few months, the American job market has seen a lot of change. Employees made the transition from commuting into an office every day to working from home. Some people lost work or experienced reduced hours, and the unemployment rate in the U.S. has jumped to 13.3% as of May 2020. However, new challenges breed new opportunities, and there are some jobs that are […] more…Big threats using code similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its […] more…Looking at Big Threats Using Code Similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its […] more…Kids on the Web in 2020
Technology is what is saving us from a complete change in the way of life in a world of a raging pandemic. It keeps the educational process going, relieves the shortage of human communication and helps us to live life as fully as possible given the isolation and social distancing. Many adults, and children too, […] more…Safeguarding Connectivity: The Security Implications of Telecoms
Telecommunications, the exchange of information by electronic means, helps keep the world connected. You can thank modern telecom companies (think AT&T, Verizon, etc.) for that, as they’ve helped form economies and entire business infrastructures. From email and messaging to phone calls and video calls, telecoms have become an intrinsic part of our lives, allowing users […] more…IT threat evolution Q1 2020. Statistics
These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, Kaspersky solutions blocked 726,536,269 attacks launched from online resources in 203 countries across the globe. A total of 442,039,230 unique URLs were recognized as malicious by Web Anti-Virus components. […] more…How to Stay Protected From Malware While Online at Home
Our everyday lives are not what they used to be three months ago. Many users have made the transition from working in an office to working from home and students have adopted distance learning. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. […] more…APT trends report Q1 2020
For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They […] more…How to Stay Cyber Safe While Social-Distancing
Do you find yourself working from home these days? Kids off school too? Then your daily life is set to change super-fast. Yes, there is so much to organise to implement this essential ‘social distancing’ strategy. But in the flurry to get everyone set up, it’s essential that we don’t cut corners, make rash decisions […] more…iOS exploit chain deploys LightSpy feature-rich malware
A watering hole was discovered on January 10, 2020 utilizing a full remote iOS exploit chain to deploy a feature-rich implant named LightSpy. The site appears to have been designed to target users in Hong Kong based on the content of the landing page. Since the initial activity, we released two private reports exhaustively detailing […] more…MonitorMinor: vicious stalkerware
The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to secretly monitor family members or colleagues. On closer inspection, we found that this app outstrips all existing software of its class in terms of functionality. Let’s take a look one step at a time. Modern […] more…MonitorMinor: vicious stalkerware?
Updated March 17th, 2020 The other day, our Android traps ensnared an interesting specimen of commercial software that is positioned as a parental control app, but may also be used to secretly monitor family members or colleagues – or, in other words, for stalking. Such apps are often called stalkerware. On closer inspection, we found […] more…Watch Out For IRS Scams and Avoid Identity Theft
It’s time to get those W-2 and 1099 tax forms ready. On January 27th, the IRS began accepting paper and electronic tax returns ahead of the April 15th due date. But as users prepare to file, scammers prepare to take advantage of innocent taxpayers with malicious tactics, looking to harvest the extensive amounts of personal […] more…More information
- Participate in Learn Hacking Contest and win Innobuzz Ethical Hacking Distance Learning Program
- The Top 5 Scariest Mobile Threats
- China tightens grip over the Internet with new security law
- Some Ideas Never Die; the Trojan is Wheeled in Again
- Threat Hunting Startup E8 Security Raises $12 Million
- Intel Sued Over ‘Downfall’ CPU Vulnerability
- Hack the Pentagon: First US government bug bounty programme opens for business
- Managed Services Provider CompuCom Hit by Malware
- Virtual Host Upgrades – January 20
- authsmtp.psu.edu degraded service