Beware the next wave of cyber threats: IoT ransomware
Ransomware has become one of the most serious cyber threats plaguing organizations. Today, all of us – from home users to corporations and government organizations – are trying to protect ourselves from encryption viruses. But we are ignoring the beginning of the next wave of ransomware attacks – aimed at encrypting IoT devices. These attacks […] more…What Interests Children Online
Today’s children and teenagers are integrated into cyberspace so tightly that discussions on the outright prohibition of using devices with Internet connectivity are nonsensical. It is more reasonable to teach children how to behave themselves correctly online and lend support by protecting them against undesirable content. To solve these problems, many parents use dedicated software […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…iPhone Phishing Scam Crosses Over Physical Crime
Last late April a friend of mine had his iPhone stolen in the streets—an unfortunately familiar occurrence in big, metropolitan areas in countries like Brazil. He managed to buy a new one, but kept the same number for convenience. Nothing appeared to be out of the ordinary at first—until he realized the thief changed his […] more…Spam and phishing in Q1 2017
Spam: quarterly highlights Spam from the Necurs botnet We wrote earlier about a sharp increase in the amount of spam with malicious attachments, mainly Trojan encryptors. Most of that spam was coming from the Necurs botnet, which is currently considered the world’s largest spam botnet. However, in late December 2016, the network’s activity almost ceased […] more…Exploits: how great is the threat?
How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents […] more…Mac OS malware saw a 744% increase in 2016
Many organizations fail to properly interpret IT security threat data or to share threat intelligence, and are unable to turn that data into actionable insights. The result is that many cyber defense systems are ill-prepared to handle the growing number of threats they experience. Those are among the findings of a new cyber security study […] more…Lazarus Under The Hood
Download full report (PDF) In February 2017 an article in the Polish media broke the silence on a long-running story about attacks on banks, allegedly related to the notoriously known Lazarus Group. While the original article didn’t mention Lazarus Group it was quickly picked up by security researchers. Today we’d like to share some of […] more…How Mobile Phones Turn Into A Corporate Threat
Over the last year, the number of mobile phones overtook the world population. In countries like the United States, mobile subscribers outnumbered traditional landline users and half of Americans shifted to mobile-only to communicate. In modern smart cities, wireless-only buildings are becoming the new construction standard for homes, factories, and organizations in general. Landline phones […] more…How Security Products are Tested – Part 1
The demand for tests appeared almost simultaneously with the development of the first antivirus programs – in the mid-to-late 1990s. Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions with the help of self-made methodologies, and later an industry of specialized companies emerged with a more comprehensive approach […] more…Mobile apps and stealing a connected car
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimedia systems (music, maps, and films are available on-board in modern luxury cars) but also car key systems in both literal and figurative senses. By using […] more…A look into the Russian-speaking ransomware ecosystem
It is no secret that encryption ransomware is one of the key malware problems today, for both consumers and corporate users. While analyzing the attack statistics for 2016, we discovered that by the end of the year a regular user was attacked with encryption ransomware on average every 10 seconds, with an organization somewhere in […] more…Kaspersky Security Bulletin 2016. The ransomware revolution
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…Kaspersky Security Bulletin 2016. Story of the year
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…Together is Power: FOCUS 16 and the Future of Cybersecurity
I led last week’s FOCUS 16 conversation with a simple question – “Are we safer together, or apart?” It was a powerful way to begin my keynote, and you can safely presume the answer I gave on behalf of all of us at Intel Security: cybersecurity outcomes are best when we work together. Together is […] more…Kaspersky DDOS intelligence report for Q3 2016
Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. […] more…More information
- Increased encryption a double-edged sword
- How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?
- DIY kits for sale on dark web spark rise of ransomware-as-a-service
- Lithuania Says Hit by Cyberattack, Russia ‘Probably’ to Blame
- Flash Greets 2015 With New Zero-Day
- Is your office printer vulnerable to being attacked?
- UK regulators launch Apple App Store probe
- My Talking Tom offers up naked selfie ads to kids
- Citrix Zero-Day Exploited Against Critical Infrastructure Organization
- Password hints easily extracted from Windows 7, 8