Looking at Big Threats Using Code Similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Internet Safety Begins with All of Us
Internet Safety Begins with All of Us Now’s the time to pause for a moment and consider just how important the internet is to us. Not just any internet. A safer internet. June marks Internet Safety Month. Why June? The original thought was that the onset of summer sees more kids online, making it an […] more…Kids on the Web in 2020
Technology is what is saving us from a complete change in the way of life in a world of a raging pandemic. It keeps the educational process going, relieves the shortage of human communication and helps us to live life as fully as possible given the isolation and social distancing. Many adults, and children too, […] more…Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges
The Senate Commerce Committee approved last week what could prove to be an essential piece of legislation for cybersecurity researchers: The Cybersecurity Competitions to Yield Better Efforts to Research the Latest Exceptionally Advanced Problems, or Cyber LEAP Act of 2020. Sponsored by Commerce Committee Chairman Roger Wicker (R-MS) and Senators Cory Gardner (R-CO) and Jacky […] more…2020 Voters: What You Need to Know About Election Security
Voters across the country are preparing to cast their ballot for the all-important 2020 U.S. presidential elections. Whether you’re a new voter eager for your voice to be heard or a parent looking to guide your family members on exercising their right to vote, consumers can be certain about one thing: election security should be […] more…Online Dating #FromHome
Online Dating #FromHome Love finds a way. And that couldn’t be more true right now. Even with so many singles keeping life close to home, dating apps have seen a big spike in downloads and usage. According to dating app Bumble, the end of March saw an 84% increase in the number of its video […] more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…IT threat evolution Q1 2020
Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted […] more…Is Your Child Being Cyberbullied? What Parents Need to Know
In this season of social distancing, teens need their friends more than ever. Daily digital connection — through texting, video chat, social networks, and gaming — is critical to keeping friend groups strong. But could increased time online these days lead to an increase in cyberbullying? While there isn’t data to answer that question definitively, […] more…World Password Day 2020
Are Your Password Habits Keeping You Safe Online? Learning how to navigate our entire lives online has definitely been a steep learning curve for many of us over the last few weeks. Whether it’s working from home, helping our kids learn from home, conducting ‘wine time’ from home or even doing our Zumba classes from […] more…DDoS attacks in Q1 2020
News overview Since the beginning of 2020, due to the COVID-2019 pandemic, life has shifted almost entirely to the Web — people worldwide are now working, studying, shopping, and having fun online like never before. This is reflected in the goals of recent DDoS attacks, with the most targeted resources in Q1 being websites of […] more…What’s the Right Age to Give Your Child a Phone?
“Can I pleeease have my own phone?” The “first phone” is one of the most loaded questions a child can ask and it can start as early as elementary school. And, with kids homebound most of the time, boredom could be fueling that dreaded request even more. That’s because phones have become an ever-present accessory […] more…Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations
No One is Invisible to Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations In this challenging time, cybercriminals have their eyes on consumers and institutions alike. Malicious groups have increased their targeting of hospitals and healthcare entities to take advantage of deepening resource strain. Many of these groups are using ransomware attacks to compromise hospital systems, locking up patient records or vaccine research until a […] more…Mozilla Says Many Popular Video Call Apps Meet Its Minimum Security Standards
Mozilla’s latest “*Privacy Not Included” report shows that twelve out of fifteen popular video call applications and platforms meet the organization’s minimum security standards. read more more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…More information
- Apple, FBI testify before Congress: These are the talking points
- Move over movie stars and your Oscars, hackers have the Pwnies
- Buran Ransomware; the Evolution of VegaLocker
- Arden Claims Service Reports Data Breach, 139,000 Affected
- For midsize businesses, there is a new way to spell risk: BYOD
- Chainguard Raises Hefty $356M Series D at $3.5 Billion Valuation
- Zero-Day Vulnerabilities in LILIN DVRs Exploited by Several Botnets
- Cisco Launches Industrial IoT Security Solution
- Adobe Patch Tuesday: Critical Bugs in Acrobat, Reader, ColdFusion
- Chipmakers face big challenges at 10nm and beyond