Truslen fra de sociale medier er en reel trussel. Her kan du se, hvordan du beskytter dig.
Der er næppe tvivl om, at muligheden for at bruge en anonymitetskappe og en meget stor mikrofon, kan få det værste frem i nogle mennesker. Det gælder især på de sociale medier. Brugen af onlinechikane og hadbeskeder bliver mere og mere udbredt og er en kilde til voksende bekymring for alle, der bruger sociale medier. […] more…Phishing-svindel: Lad være med at klikke på linket!
Du sidder og slapper af i haven. En fremmed kommer gående ude på vejen. Du aner ikke, hvem det er. Men han er nydeligt klædt. Han spørger, om han må komme ind og se dit hus og gennemse dine kontoudtog fra banken, få dit kontonummer og skrive numrene på dine kreditkort ned. Og han vil […] more…Spam and phishing in Q3 2016
Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter, this figure once again increased significantly. According to KSN data, in Q3 2016 the number of email antivirus detections totaled 73,066,751. Most malicious attachments contained Trojan downloaders that […] more…Together is Power: FOCUS 16 and the Future of Cybersecurity
I led last week’s FOCUS 16 conversation with a simple question – “Are we safer together, or apart?” It was a powerful way to begin my keynote, and you can safely presume the answer I gave on behalf of all of us at Intel Security: cybersecurity outcomes are best when we work together. Together is […] more…Stop Losing Sleep over Compliance Audits
Regulations take many forms, depending upon the industry, the region, and the type of data being protected, but one thing is consistent among them: regulators frown on poor data-protection practices.Compliance can be a chore, and many organizations try to minimize the pain by taking a “one and done” approach. They go through all the necessary […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…Two months after its release, Nougat is on 0.3% of Android devices
Google released its Android usage share numbers today, which typically arrive monthly, with the exception of last month. Because of that, this is the first time that Android 7.0 Nougat has appeared on the board. The data was collected throughout a seven-day period ending today, November 7. Android 5.1 Lollipop is still showing growth, for […] more…Fight Against Ransomware Takes to the Cloud
“How many visitors do you expect to access the No More Ransom Portal?” This was the simple question asked prior to this law enforcement (Europol’s European Cybercrime Centre, Dutch Police) and private industry (Kaspersky Lab, Intel Security) portal going live, which I didn’t have a clue how to answer. What do YOU think? How many […] more…Cyber Parenting – Let’s Hear What Mothers Have to Say
Children’s Day is around the corner and it has me thinking. With all the brouhaha over a connected future and devices that can monitor, make decisions and communicate; are we doing enough to prepare our children to stay safe online? Are we, the digital immigrants, cyber-mentoring the next generation? Parents today have a tough job […] more…New Bizarro Sundown Exploit Kit Spreads Locky
A new exploit kit has arrived which is spreading different versions of Locky ransomware. We spotted two cases of this new threat, which is based on the earlier Sundown exploit kit. Sundown rose to prominence (together with Rig) after the then-dominant Neutrino exploit kit was neutralized. Called Bizarro Sundown, the first version was spotted on October 5 with a second sighting two weeks […] more…IT threat evolution Q3 2016. Statistics
Download the full report (PDF) Statistics All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide […] more…Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat
A new report highlights the high number of users still operating outdated Windows operating systems and unsupported browsers. This represents a huge threat to the organizations whose users access company networks from insecure laptops and home computers within the growing adoption of BYOD policies. read more more…Top 5 Things to Know About Recent IoT Attacks
Recent Internet attacks have resulted in several popular sites becoming unreachable. The list includes Twitter, Etsy, Spotify, Airbnb, Github, and The New York Times. These incidents have brought to light a new threat to online services: botnets powered by the Internet of Things (IoT). Distributed denial of service (DDoS) attacks have been commonplace for more […] more…Intel Security Innovation Alliance 2016 DEVCON Awards
Innovation and enthusiasm fuel the Intel Security Innovation Alliance program, and we are excited to see that our partners are actively pursuing opportunities to integrate their products with our technologies to extend our open, connected ecosystem. Every year at the Intel Security Innovation Alliance Developers Conference (SIA DEVCON)—which takes place in conjunction with the Intel […] more…Delete unused Android apps now, or risk a security nightmare
Quick! Open your Android device, go to the App Drawer, and count the number of apps you no longer use that are still installed. Now go back through that list of apps you no longer use and find out which ones are no longer maintained or which suffer from long-standing malware vulnerabilities. Done? Didn’t think […] more…Kaspersky DDOS intelligence report for Q3 2016
Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. […] more…More information
- Podcast: WWDC 2021 recap: iPadOS overview, enterprise improvements and unnannounced iOS 15 features
- The SolarWinds hackers aren’t back—they never went away
- Leaked GitHub Token Exposed Mercedes Source Code
- Men Overran a Job Fair for Women in Tech
- Malware analysis sandbox aggregation: Welcome Tencent HABO!
- 5 Tips for Long-Term Remote Workers
- Microsoft Windows GDI Component CVE-2019-0977 Information Disclosure Vulnerability
- Tor network used to command Skynet botnet
- 1H 2014 Spam Attacks and Trends
- Moving Around