IT threat evolution Q3 2016. Statistics
Download the full report (PDF) Statistics All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide […] more…How an Online Prank Had Countless Phones Dialing 911
Remember elementary school, when prank notes left on fellow students’ desks caused uproars of laughter? Those were golden days. Consequences were intangible — coming just from adults to (seemingly) steal the fun. But of course, as we grow older, the first taste of reality is harsh. In recent cybersecurity news, that’s exactly what hit […] more…New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files
Like a game of cat and mouse, the perpetrators behind the Locky ransomware had updated their arsenal yet again with a new tactic—using Windows Scripting File (WSF) for the arrival method. WSF is a file that allows the combination of multiple scripting languages within a single file. Using WSF makes the detection and analysis of ransomware challenging […] more…IT threat evolution in Q2 2016. Statistics
Download the full report (PDF) All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide participate […] more…KSN Report: Mobile ransomware in 2014-2016
Part 1. KSN Report: PC ransomware in 2014-2016 Download PDF version Statistics The activity of mobile ransomware, although not as widely covered in the media as PC ransomware, also skyrocketed over the period covered by this report. Especially in the second half. Fig. 12: The number of users encountering mobile ransomware at least once in […] more…Kaspersky Security Bulletin. Spam and phishing in 2015
Download PDF The year in figures According to Kaspersky Lab, in 2015 The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014. 79% of spam emails were no more than 2 KB in size. 15.2% of spam was sent from the US. 146,692,256 instances that triggered the […] more…Without a Trace: Fileless Malware Spotted in the Wild
Improvements in security file scanners are causing malware authors to deviate from the traditional malware installation routine. It’s no longer enough for malware to rely on dropping copies of themselves to a location specified in the malware code and using persistence tactics like setting up an autostart feature to ensure that they continue to run. […] more…CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files
We uncovered a new crypto-ransomware variant with new routines that include making encrypted files appear as if they were quarantined files. These “quarantined” files are appended by a *.VAULT file extension, an antivirus software service that keeps any deleted files for a certain period of time. Antivirus software typically quarantines files that may potentially cause further damage to […] more…Cross site scripting (XSS) Research Paper By Aarshit Mittal and Harsha Vardhan Boppana
Cross site scripting (XSS) By Aarshit Mittal and Harsha Vardhan BoppanaCross site scripting is a web application based attack generally found in online services, pages of the websites the attack is a temporary attack but can be used by a black hat hacker or a financial cyber fraud for a permanent attack on user’s confidential data. […] more…Cross site scripting (XSS) Research Paper By Aarshit Mittal and Harsha Vardhan Bopanna
Cross site scripting (XSS) By Aarshit Mittal and Harsha Vardhan BopannaCross site scripting is a web application based attack generally found in online services, pages of the websites the attack is a temporary attack but can be used by a black hat hacker or a financial cyber fraud for a permanent attack on user’s confidential […] more…OSX_FLASHBCK: A Backlash to Apple’s Popularity?
The Flashback malware discovered last week is raising doubts over the security of the Mac platform. The Trojan, detected by Trend Micro as OSX_FLASHBCK.AB, continues to be a hot topic in the computing industry and it opposes Apple’s own concept that their Mac OS are threat-proof. But this attack, along with an onslaught of malware […] more…More information
- Cyber-extortionists are liars
- Microsoft Exchange Server CVE-2018-8581 Remote Privilege Escalation Vulnerability
- WebAccess Performance testing during maintenance window of 1/24
- NSA to cut system administrators by 90 percent to limit data access
- The metaverse: Not dead yet
- What CIOs can learn about security threats from 4 recent hacks
- Security Calling: Celebrate National Telephone Day by Securing Your Mobile Devices
- Do you still need a firewall?
- Phantom Ships Expose Weakness in Vessel-Tracking System
- Using Cyber Threat Intelligence to Reduce Actors’ Opportunities