The Hunt for Lurk
In early June, 2016, the Russian police arrested the alleged members of the criminal group known as Lurk. The police suspected Lurk of stealing nearly three billion rubles, using malicious software to systematically withdraw large sums of money from the accounts of commercial organizations, including banks. For Kaspersky Lab, these arrests marked the culmination of […] more…Will CryptXXX Replace TeslaCrypt After Ransomware Shakedown?
by Jaaziel Carlos, Anthony Melgarejo, Rhena Inocencio, and Joseph C. Chen The departure of TeslaCrypt from the ransomware circle has gone and made waves in the cybercriminal world. Bad guys appear to be jumping ships in hopes of getting a chunk out of the share that was previously owned by TeslaCrypt. In line with this recent […] more…Will CryptXXX Replace TeslaCrypt After Ransomware Shakeup?
by Jaaziel Carlos, Anthony Melgarejo, Rhena Inocencio, and Joseph C. Chen The departure of TeslaCrypt from the ransomware circle has gone and made waves in the cybercriminal world. Bad guys appear to be jumping ships in hopes of getting a chunk out of the share that was previously owned by TeslaCrypt. In line with this recent […] more…All your creds are belong to us
Download the full report (PDF) With astonishing annual revenues of over a hundred billion dollars, the gaming industry has in the past been compared to Hollywood’s burgeoning business, repeatedly demonstrating the influence behind its ever expanding and loyal fan base. Having an endless list of “big hit” video-games coexisting peacefully with humble but still fun-filled […] more…“All your creds are belong to us”
Download the full report (PDF) With astonishing annual revenues of over a hundred billion dollars, the gaming industry has in the past been compared to Hollywood’s burgeoning business, repeatedly demonstrating the influence behind its ever expanding and loyal fan base. Having an endless list of “big hit” video-games coexisting peacefully with humble but still fun-filled […] more…Attack on Zygote: a new twist in the evolution of mobile threats
The main danger posed by apps that gain root access to a mobile device without the user’s knowledge is that they can provide access to far more advanced and dangerous malware with highly innovative architecture. We feared that Trojans obtaining unauthorized superuser privileges to install legitimate apps and display advertising would eventually start installing malware. […] more…Kaspersky Security Bulletin. Spam and phishing in 2015
Download PDF The year in figures According to Kaspersky Lab, in 2015 The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014. 79% of spam emails were no more than 2 KB in size. 15.2% of spam was sent from the US. 146,692,256 instances that triggered the […] more…More information
- Attacks Use Windows BITS Notifications to Download Malware
- Mozilla mandates 2FA security for Firefox developers
- Microsoft Windows ‘DirectWrite’ API CVE-2019-1119 Remote Code Execution Vulnerability
- Facebook faces class action suit in Canada over interception of private messages
- What is security’s role in digital transformation?
- Cybersecurity Community Unhappy With GitHub’s Proposed Policy Updates
- 90 Days to Shine: Why Sucuri’s SSL Certificates Are Living the Short Life (and Why That’s Awesome)
- Facebook Quietly Makes a Big Admission
- Leaked iCloud credentials obtained from third parties, Apple says
- Woman reunited with stolen iPhone thanks to accidental Facebook selfie post