APT trends report Q2 2021
For more than four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They […] more…It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that mean for consumers? It means that McAfee will be able to focus 100% of our talent and expertise on innovation and development that directly enables and improves the products and services that protect you and your family. It’s the right time to take […] more…DDoS attacks in Q2 2021
News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the active distribution of a new DDoS botnet called Simps — the name under which it introduced itself to owners of infected devices. The malware creators promoted their brainchild on a specially set-up YouTube channel and Discord […] more…How to Secure Your Smart Home: A Step-by-Step Guide
How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in every household. In fact, the number of smart households (those that contain smart home technology) in the U.S. is expected to grow to 77.05 million by 2025. But with new technology comes new challenges. Many product designers rush to get their smart devices to market, […] more…The best Android launchers for enhanced efficiency
Your smartphone’s home screen is the heart and soul of your mobile tech experience — the launching pad for nearly everything you do on your device. And since you use Android, you’ve got a unique advantage over your iPhone-totin’ associates in that your home screen doesn’t have to be the same tired old grid everyone […] more…Detecting unknown threats: a honeypot how-to
Catching threats is tricky business, especially in today’s threat landscape. To tackle this problem, for many years сybersecurity researchers have been using honeypots – a well-known deception technique in the industry. Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s honeypot project, explains what honeypots are, why they […] more…7 Tips to Protect Your Smartphone from Getting Hacked
There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you. Globally, plenty of people pull double duty […] more…Behind the scenes with the head of Kaspersky’s GReAT
Costin Raiu has been with Kaspersky since 2000, initially as the Chief Security Expert overseeing research efforts in the EEMEA region. In 2010, he became Director of our Global Research and Analysis Team (GReAT). During his tenure at Kaspersky, he has spearheaded the company’s research on some of the most infamous cyber threat campaigns in […] more…Compact quantum computer for server centers
Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be […] more…Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart speakers, smart outlets, or any number of other connected gadgets and do-dads are popular picks, one thing often gets overlooked—protecting those devices from hacks and attacks. We live in a day and age when even connected lightbulbs can be hacked. The reality is that […] more…Black Kingdom ransomware
Black Kingdom ransomware appeared on the scene back in 2019, but we observed some activity again in 2021. The ransomware was used by an unknown adversary for exploiting a Microsoft Exchange vulnerability (CVE-2021-27065). The complexity and sophistication of the Black Kingdom family cannot bear a comparison with other Ransomware-as-a-Service (RaaS) or Big Game Hunting (BGH) […] more…Ferocious Kitten: 6 years of covert surveillance in Iran
Ferocious Kitten is an APT group that since at least 2015 has been targeting Persian-speaking individuals who appear to be based in Iran. Although it has been active for a long time, the group has mostly operated under the radar and has not been covered by security researchers to the best of our knowledge. It […] more…How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels and riding out into the neighborhood for the first time, a smartphone opens an entirely new world for children. There are apps, social media, group chats with friends, TikTok stars, and the joy of simply being “in” with their classmates and […] more…WWDC: What’s new for App Clips in ARKit 5
One of Apple’s quietly significant WWDC 2021 announcements must be its planned improvements to ARKit 5’s App Clip Codes feature, which becomes a powerful tool for any B2B or B2C product sales enterprise. Some things just seem to climb off the page When introduced last year, the focus was on offering up access to tools […] more…How to Teach Kids About Online Safety: A Guide
Kids are online now more than ever, not just during free time, but also during school time. It is impossible to always peek over their shoulder, and depending on their age, they may grow tired of a POS (aka parent over shoulder). The internet can be a dangerous place, but with the right education, kids can navigate hazards and remain safe and calm while online. Check out this online safety guide on […] more…Email spoofing: how attackers impersonate legitimate senders
Introduction In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing of email addresses through changing the From header, which provides information about the sender’s name and address. SMTP (Simple Mail Transfer Protocol, the main email transmission protocol in TCP/IP networks) offers no protection against spoofing, […] more…More information
- RIMageddon: Three end-game scenarios
- The OPM breach deepens: 5.6 million federal employees’ fingerprints stolen
- We test the new Gemini-powered Bard against ChatGPT
- Turla cyberespionage group exploits satellite Internet links for anonymity
- Latest Android security hole shows why IT should consider a mobile app whitelist
- Sarah Silverman sues OpenAI, Meta over copyright infringement in AI training
- Is Computer Security Becoming a Hardware Problem?
- AMD Radeon Driver Flaw Leads to VM Escape
- Second SWIFT Attack Hits Vietnam Bank Showing Links to Sony Hack
- Payment Card Breach Hits Over 260 Caribou Coffee Stores