Ransomware by the numbers: Reassessing the threat’s global impact
Kaspersky has been following the ransomware landscape for years. In the past, we’ve published yearly reports on the subject: PC ransomware in 2014-2016, Ransomware in 2016-2017, and Ransomware and malicious crypto miners in 2016-2018. In fact, in 2019, we chose ransomware as the story of the year, upon noticing the well-known threat was shifting its […] more…Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded in return for access to […] more…Why do the Vast Majority of Applications Still Not Undergo Security Testing?
Did you know that 84% of all cyber attacks target applications, not networks? What’s even more curious is that 80% of Internet of Things (IoT) applications aren’t even tested for security vulnerabilities. It is 2018, and despite all the evidence around us, we haven’t fully accepted the problem at hand when it comes to software […] more…Most Common Attacks Affecting Today’s Websites
New web-based attack types and vectors are coming out every day, this is causing businesses, communities and individuals to take security seriously now more than they ever have in the past. This is a huge win for the World Wide Web and it’s a trend that is pushing technology further towards more robust and securely […] more…Microsoft: Windows Phone now the number two mobile OS in Latin America
While the Windows Phone platform is still struggling in the US to gain market share, its growth is accelerating in other parts of the world. Today, Microsoft announced that, according to a report from IDC, Windows Phone is currently the second most widely used mobile OS in all of Latin America. Tags: Microsoft WP more…4 Hot Apps Parents Need to Download Today
It’s no secret, kids retreat when parents begin to crowd their private space. Have you noticed when you look for your son or daughter on Facebook, you are greeted by the sound of crickets? Don’t worry your teen is just as active in social networks, just not the ones where they will run into you. […] more…Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared to have stopped uploading these apps in May, they have now resumed the attacks. We have confirmed about 600 malicious applications have been published since the beginning of April. We have also confirmed that another […] more…Internet Slow Today? Global “Biggest Attack Ever” May Be to Blame
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns […] more…Netflix Slow Today? Global “Biggest Attack Ever” May Be to Blame
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns […] more…Automation is Key With Today’s Website Attacks
When trying to undertand the anatomy of attacks on websites you have to break it down into manageable parts. In my mind it really comes down to two types: Targeted and Opportunistic. More important to understand is how the attack is executed, and that’s what I want to spend some time on in this post. […] more…Backdoor Tool Kit – Today’s Scary Web Malware Reality
We often talk about the importance of keeping your server clean. You can see it in a number of our articles and presentations, this post will likely drive that point home. This past week we came across a nice little package that we felt compelled to share with you. In it, the attacker makes use […] more…Flashback botnet not shrinking, huge numbers of Macs still infected
Contrary to reports by several security companies, the Flashback botnet is not shrinking, the Russian antivirus firm that first reported the massive infection three weeks ago claimed today. read more more…Cyber Insights 2023 | Zero Trust and Identity and Access Management
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023: Venture Capital
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023 | Ransomware
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…Cyber Insights 2023 | Quantum Computing and the Coming Cryptopocalypse
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…More information
- NSA admits employees spied on loved ones
- Offensive Security Acquires Cybersecurity Training Project VulnHub
- Update: Maintenance: PASS may be slow on 4/9 – 4/10
- Should You Use AES or TKIP for a Faster Wi-Fi Network?
- Microsoft Internet Explorer CVE-2015-0022 Remote Memory Corruption Vulnerability
- Facebook Says Ready for New California Privacy Law
- SSI (server side include) injection, shell and deface Page uploading tutorial
- Privacy advocates find Obama proposal lacking
- Jobert Abma makes $100,000 a year as a ‘bug bounty hunter’
- Unix: A Game Changer in the Ransomware Landscape?