Russian Hackers Target Journalists Investigating MH17 Crash
Two Russia-linked threat groups have been targeting citizen journalists investigating Moscow’s involvement in the downing of Malaysia Airlines flight MH17 in July 2014 as it was crossing Ukraine. read more more…Big threats using code similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its […] more…Looking at Big Threats Using Code Similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- Cloud Data Security Firm Dig Emerges From Stealth With $11 Million in Funding
- ‘Pulling back the curtain’ to reveal a molecular key to The Wizard of Oz
- Involved in a data breach? Firefox to test alerts in the browser
- How to: Destroy hard drives and make old Android devices ‘secure’
- Mobile security updates are a mess. The FCC and FTC want to know why.
- Viva Connections: What your intranet wants to be
- Several DoS Vulnerabilities Patched in NTP
- Two Men Arrested for JFK Airport Taxi Hacking Scheme
- WordPress backup plugin maker Updraft says “You should update”…
- Beating the dark side of quantum computing