AZORult++: Rewriting history
The AZORult Trojan is one of the most commonly bought and sold stealers in Russian forums. Despite the relatively high price tag ($100), buyers like AZORult for its broad functionality (for example, the use of .bit domains as C&C servers to ensure owner anonymity and to make it difficult to block the C&C server), as […] more…Hacking microcontroller firmware through a USB
In this article, I want to demonstrate extracting the firmware from a secure USB device running on the Cortex M0. Who hacks video game consoles? The manufacture of counterfeit and unlicensed products is widespread in the world of video game consoles. It’s a multi-billion dollar industry in which demand creates supply. You can now find […] more…Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time to their families the chance to reignite their passion for the technology industry and relaunch their careers. Sometimes, it’s necessary to put your career on hold to raise kids, care for loved ones or serve […] more…Telecom Crimes Against the IoT and 5G
by: Trend Micro Research and Europol’s European Cybercrime Centre (EC3) Telecommunications or telecom technology is the underpinning of the modern internet, and consequently, the internet’s growing segment, the internet of things (IoT). Likewise, the global telecommunications network we enjoy today has been greatly influenced by the existence and growth of the internet. Between telecom and […] more…Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader API (CVE 2019-5786). Clement Lecigne from Google Threat Analysis Group reported the bug as being exploited in the wild and targeting Windows 7, 32-bit platforms. The exploit leads to code execution in the Renderer process, […] more…5 Suits to Buy to Update Your Business Wardrobe
The wardrobe of a man is always incomplete without suits. Men’s suits have always enjoyed immense reputation and popularity around the world. Men’s suits always show professionalism and distinctiveness and are also worn as a statement of style suits can be worn for different occasions. There are different types of men’s suits available in different […] more…5 Tips For Creating Bulletproof Passwords
While biometric tools like facial ID and fingerprints have become more common when it comes to securing our data and devices, strong passwords still play an essential part in safeguarding our digital lives. This can be frustrating at times, since many of us have more accounts and passwords than we can possibly remember. This can […] more…What is Search Engine Optimisation (SEO)?
SEO оr Sеаrсh Enginе Oрtimiѕаtiоn iѕ thе nаmе givеn tо асtivitу that аttеmрtѕ to imрrоvе ѕеаrсh engine rаnkingѕ. In search results Gооglе displays linkѕ tо раgеѕ it соnѕidеrѕ relevant аnd аuthоritаtivе. Authоritу is mоѕtlу mеаѕurеd bу аnаlуѕing the numbеr аnd quality of linkѕ frоm оthеr wеb раgеѕ.In ѕimрlе terms уоur wеb pages have thе роtеntiаl […] more…A predatory tale: Who’s afraid of the thief?
In mid-February, Kaspersky Lab received a request for incident response from one of its clients. The individual who initially reported the issue to our client refused to disclose the origin of the indicator that they shared. What we do know is that it was a screenshot from one of the client’s internal computers taken on […] more…Financial Cyberthreats in 2018
Introduction and Key Findings The world of finance has been a great source of income cybercriminals across the world due to an obvious reason – money. While governments and organizations have been investing in new methods to protect financial services, malicious users have been investing in how to bypass them. This has fueled many changes […] more…How To Secure Your Smart Home
Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected devices like thermostats and appliances, you are now one of the millions of people who live with so-called “smart” devices. They bring convenience and comfort into our lives, but they also bring greater risks, by […] more…UPnP-enabled Connected Devices in the Home and Unpatched Known Vulnerabilities
by Tony Yang (Home Network Researcher) Earlier this year, users of Chromecast streaming dongles, Google Home devices, and smart TVs were inundated with a message promoting YouTuber PewDiePie’s channel. The hijacking is said to be part of an ongoing subscriber count battle on the video sharing site. The hackers behind it reportedly took advantage of […] more…Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send up a silent prayer for the thousands of nervous youngsters who are at the juxtaposition of a crucial time in their lives – the time when they have to take serious decisions regarding college education […] more…Time for VT Enterprise to step up
Late last year we announced the release of VT Enterprise for existing VT Intelligence subscribers. Since the launch, we have iterated on and improved upon VT Enterprise and it is time to begin a full deprecation of the old VT Intelligence interface. Today, we are announcing a 1 month deprecation timeline. Note that this does […] more…Exposed IoT Automation Servers and Cybercrime
by: Stephen Hilt, Numaan Huq, Martin Rösler, and Akira Urano In our latest research “Cybersecurity Risks in Complex IoT Environments: Threats to Smart Homes, Buildings and Other Structures,” we tested possible threat scenarios against complex IoT environments such as in smart homes and smart buildings. A significant part of the research also involved a look […] more…Mobile malware evolution 2018
The statistical data for this report came from all Kaspersky Lab mobile security solutions, not just Kaspersky Mobile Antivirus for Android. Consequently, the comparative data for 2017 may differ from the data for the same period published in the previous report. The analytical scope was expanded due to the growing popularity of various Kaspersky Lab […] more…More information
- Not another Windows interface!
- “Instant bank fraud” warning spread on WhatsApp is a hoax
- SandJacking Attack Puts iOS Devices At Risk to Rogue Apps
- Investors Betting Big on Upwind for CNAPP Tech
- Microsoft Windows Object Packager Remote Code Execution Vulnerability
- 7 tips to strengthen online security
- Scientists stop and search malware hidden in shortened urls on Twitter
- Android Mobile Ransomware: Bigger, Badder, Better?
- XcodeGhost Compiler Malware Targets iOS, OS X Systems
- Attack of the 90s Kids: Chinese Teens Take On the Mobile Ransomware Trade