Podcast: Google makes its own chip for the Pixel 6, plus how to make hybrid work successful
Google announced that its new system on a chip, called Tensor, will power the upcoming the Pixel 6 and Pixel 6 Pro phones. Google says Tensor will improve the Pixel’s camera system and its speech recognition abilities, among other things. The company’s shift away from Qualcomm to Tensor follows Apple’s path of making its own […] more…How to give your phone an Android-12-inspired privacy upgrade
Android 12 sure is an onion of an update, wouldn’t ya say? Now, don’t get me wrong: I’m not suggesting it’s fragrant, likely to make you cry, or positively delicious when cooked in a stir-fry. (That’d be one heck of a piece of software!) I just mean that it has lots of layers to it, […] more…APT trends report Q2 2021
For more than four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They […] more…It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that mean for consumers? It means that McAfee will be able to focus 100% of our talent and expertise on innovation and development that directly enables and improves the products and services that protect you and your family. It’s the right time to take […] more…DDoS attacks in Q2 2021
News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the active distribution of a new DDoS botnet called Simps — the name under which it introduced itself to owners of infected devices. The malware creators promoted their brainchild on a specially set-up YouTube channel and Discord […] more…How to Secure Your Smart Home: A Step-by-Step Guide
How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in every household. In fact, the number of smart households (those that contain smart home technology) in the U.S. is expected to grow to 77.05 million by 2025. But with new technology comes new challenges. Many product designers rush to get their smart devices to market, […] more…Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the […] more…COVID-19 Vaccine Passports: 5 Security Tips for You and Your Family
Depending on where your travels take you, you might need a new passport—a COVID-19 vaccine passport. In an effort to kickstart travel and local economies, these so-called vaccine passports are more accurately a certificate. Such a “passport” can offer proof that the holder has been fully vaccinated against the virus, and there are several of these passports developing in the wings. With all of this in motion, I wanted to give families a look at […] more…The best Android launchers for enhanced efficiency
Your smartphone’s home screen is the heart and soul of your mobile tech experience — the launching pad for nearly everything you do on your device. And since you use Android, you’ve got a unique advantage over your iPhone-totin’ associates in that your home screen doesn’t have to be the same tired old grid everyone […] more…Having the right tool for the job
Not all the investigations are tackled the same way. Sometimes from a single sample we need to quickly find as much context as possible. In other situations, we are presented with a handful of IOCs and we need to make a sense of what’s going on. When you have a few pieces of the puzzle, […] more…How to confuse antimalware neural networks. Adversarial attacks and protection
Introduction Nowadays, cybersecurity companies implement a variety of methods to discover new, previously unknown malware files. Machine learning (ML) is a powerful and widely used approach for this task. At Kaspersky we have a number of complex ML models based on different file features, including models for static and dynamic detection, for processing sandbox logs […] more…7 Tips to Protect Your Smartphone from Getting Hacked
There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you. Globally, plenty of people pull double duty […] more…Behind the scenes with the head of Kaspersky’s GReAT
Costin Raiu has been with Kaspersky since 2000, initially as the Chief Security Expert overseeing research efforts in the EEMEA region. In 2010, he became Director of our Global Research and Analysis Team (GReAT). During his tenure at Kaspersky, he has spearheaded the company’s research on some of the most infamous cyber threat campaigns in […] more…Compact quantum computer for server centers
Quantum computers have been one-of-a-kind devices that fill entire laboratories. Now, physicists have built a prototype of an ion trap quantum computer that can be used in industry. It fits into two 19-inch server racks like those found in data centers throughout the world. The compact, self-sustained device demonstrates how this technology will soon be […] more…Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart speakers, smart outlets, or any number of other connected gadgets and do-dads are popular picks, one thing often gets overlooked—protecting those devices from hacks and attacks. We live in a day and age when even connected lightbulbs can be hacked. The reality is that […] more…Black Kingdom ransomware
Black Kingdom ransomware appeared on the scene back in 2019, but we observed some activity again in 2021. The ransomware was used by an unknown adversary for exploiting a Microsoft Exchange vulnerability (CVE-2021-27065). The complexity and sophistication of the Black Kingdom family cannot bear a comparison with other Ransomware-as-a-Service (RaaS) or Big Game Hunting (BGH) […] more…More information
- Privacy Awareness Week 2019 – Are You In The Dark About Your Online Privacy?
- Russian Admits in US Court to Laundering Money for Ryuk Ransomware Gang
- Quiz: Name that hacker
- Okta’s API access product targets the trend toward services
- Man who spied on cheating wife’s email has charges against him dropped (because she was snooping back)
- SSCC 178 – Are we there yet? [PODCAST]
- Google Removes Inline Installation of Chrome Extensions
- Hackers can crash iPhones via Snapchat, says researcher
- Serious Flaws Found in ATMs of German Bank
- Linux powers CERN — organization deploys Red Hat technologies