Kaspersky Security Bulletin. Predictions for 2017
Download the PDF Yet another year has flown past and, as far as notable infosec happenings are concerned, this is one for the history books. Drama, intrigue and exploits have plagued 2016 and, as we take stock of some of the more noteworthy stories, we once again cast our gaze forward to glean the shapes […] more…Could Your Kids Be Ordering Dangerous Drugs Online?
According to recent news reports, police have linked a drug named Pink to the overdose deaths of two 13-year-old boys in Park City, Utah. Also known as U-47700, Pink is a new synthetic, opioid drug easily purchased online. The teens, who were best friends, ordered the drug from China. The drug Pink is reported to […] more…Scheduled Maintenance – UPS replacement at Pattee/Paterno Library hub site
OVPIT – ENCS/TNS will be replacing the Uninterruptible Power Supply (UPS) system that serves the Pattee HUB site on Sunday 11/20/2016, starting at 5AM with work expected to be completed by 5PM. In order to perform this work, all equipment at the Pattee HUB site will transferred to temporary power. This temporary power source will […] more…¿Es hora de concientizar sus hijos sobre el fraude digital?
Hace mucho, vi una película en la que el héroe regresaba a casa después de una experiencia desgarradora y descubría que un impostor había tomado su lugar. El impostor había asumido el nombre, las credenciales e, incluso, la empresa del héroe. Al héroe le costó mucho comprobar su legitimidad y demostrarle al mundo que su […] more…President Trump: An uncertain future for tech industry, digital rights
U.S. President-elect Donald Trump’s vision for the country’s economy-driving technology industry is largely a blank canvas, and when he’s dipped his toe into IT issues, he’s made people nervous. Trump’s campaign was dominated by debates over illegal immigration, lost manufacturing jobs, and character issues. Silicon Valley firms largely opposed Trump, and one of his signature […] more…Zeit, Ihren Kindern digitalen Betrug zu erläutern?
Vor langer Zeit habe ich einen Film gesehen, in dem der Held nach einem schlimmen Erlebnis heimkehrte, um zu erfahren, dass sich dort ein Betrüger eingerichtet hatte. Dieser Betrüger hatte den Namen, die Berechtigungsnachweise und sogar das Unternehmen des Helden übernommen. Es war schwierig für den Helden, seine Legitimität zu beweisen und der Welt zu […] more…Häufig gestellte Fragen zum Thema Identitätsdiebstahl
Meine Lehrer haben immer gesagt, es gebe keine dummen Fragen. Bei Identitätsdiebstahl ist das besonders wahr. Je mehr Sie über Identitätsdiebstahl wissen, desto besser können Sie verhindern, dass Sie zum Opfer werden. Hier finden Sie einige häufig gestellte Fragen zum Thema Identitätsdiebstahl. Was ist Identitätsdiebstahl? Identitätsdiebstahl findet statt, wenn eine Person vorgibt, Sie zu sein, […] more…Seien Sie auf der Hut vor betrügerischen Support-Anrufen
Vor ein paar Jahren war ich mal vor dem Abendessen am Computer beschäftigt. Meine Frau kam in mein Zimmer und sagte mit einem eigenartigen Gesichtsausdruck ins Telefon: “Ich glaube, darüber sollten Sie mit meinem Mann sprechen.” Ich nahm das Telefon und wurde folgendermaßen begrüßt: “Hallo, hier ist Rick vom Windows-Support. Ich rufe an, weil von […] more…Spam and phishing in Q3 2016
Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter, this figure once again increased significantly. According to KSN data, in Q3 2016 the number of email antivirus detections totaled 73,066,751. Most malicious attachments contained Trojan downloaders that […] more…Lo brillante se mezcla con lo sostenible: OpenDXL como una plataforma de orquestación
De vez en cuando entro en un debate sobre qué constituye una plataforma. Para mí, significa conectar funciones y datos tan fácilmente y directamente como sea posible, equilibrando velocidad, simplicidad y seguridad. Si bien es bueno presentar esto como una arquitectura, con interfaces abiertas, el desarrollo de software moderno es más complejo. Las interfaces programables, […] more…IT threat evolution Q3 2016. Statistics
Download the full report (PDF) Statistics All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide […] more…Microsoft to patch Windows bug that Google revealed
Microsoft on Tuesday said it would patch a Windows vulnerability next week that Google publicly revealed just 10 days after notifying Microsoft. Microsoft also identified the attackers, asserting that they were the same who had been accused by authorities of hacking the Democratic National Committee (DNC). “All versions of Windows are now being tested … […] more…The Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology. One of the challenges we face in the security industry is the growth of the Internet of Things (IoT). IoT is about connecting everyday objects to the Internet. It might be a toaster, alarm clock, […] more…Kaspersky DDOS intelligence report for Q3 2016
Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. […] more…Lessons learned from the DYN attack
Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. The large scale DDoS attack on DYN last week interrupted access to many major web sites, and while the specifics of the attack have been widely analyzed, here are the important lessons learned: […] more…Intel Security: navigating security for the hybrid cloud
As a Sci-Fi fan, the journey to the cloud reminds me of the USS Enterprise in Star Trek whose mission was to explore new worlds—to boldly go where no one has gone before. As businesses rush head-on into the digital frontier, spinning up new cloud instances at warp speed, the key question for security professionals […] more…More information
- 5 ways users circumvent security measures and how to prevent it
- Microsoft Internet Explorer CVE-2015-1730 Remote Memory Corruption Vulnerability
- WhatsApp and privacy – will Facebook make things better, worse, or both?
- Your Fingerprints Might Change the Color of Your iPhone 15 Pro
- Security is Not a One-Person Job
- Touch-based identity faces an uncertain future after Face ID
- Uber ‘showing drivers and riders different fare estimates’, says lawsuit
- Apple to begin reopening stores in US next week
- White House raises concerns over CISPA bill
- Microsoft Edge and Internet Explorer CVE-2017-0238 Remote Memory Corruption Vulnerability