Analysis: BitGuard: a system of forced searches
In the past year, many users have been forced to deal with an extremely aggressive multi-component system BitGuard which is difficult to completely remove without professional assistance, although...
View ArticleBlog: Caution: Malware pre-installed!
Chinas leading TV station, CCTV, has a long-standing tradition of marking World Consumer Rights Day on March 15 with its 315 Evening Party.
View ArticleAnalysis: Financial cyber threats in 2013. Part 1: phishing
It has been quite a few years since cybercriminals started actively stealing money from user accounts at online stores, e-payment systems and online banking systems.
View ArticleBlog: Garfield Garfield True, or the story behind Syrian Malware, .NET...
It's been a while since the last massive Internet outage took down Syria’s backbone network (AS29386).
View ArticleBlog: Stealing from wallets
We’ve written several times about mobile malware that can send text messages to premium numbers or steal money from online bank accounts. We also know that cybercriminals are constantly looking for new...
View ArticleBlog: End of the line for Windows XP
Support for Windows XP is ending: after today there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates.
View ArticleBlog: Microsoft Updates April 2014 - Office and Internet Explorer Critical...
Absolutely all of the latest versions of Microsoft Word and some versions of Internet Explorer maintain critical vulnerabilities enabling remote code execution. Today, Microsoft releases two critical...
View ArticleBlog: The omnipresent dad
Many websites show different text depending on where the user lives. For instance, home pages of some portals show you the news and weather of your region by default, because you are most likely to be...
View ArticleAnalysis: Financial cyber threats in 2013. Part 2: malware
Programs designed to steal e-money and financial data are among the most complicated types of malicious software out there today.
View ArticleBlog: SyScan 2014
In the first week of April 2014 we were at The Symposium on Security for Asia Network" (SyScan) (http://www.syscan.org/), a geeky single-track conference located in Singapore.
View ArticleAnalysis: IT threat evolution Q1 2014
According to KSN data, Kaspersky Lab products blocked a total of 1131000866 malicious attacks on computers and mobile devices in the first quarter of 2014.
View ArticleBlog: CeCOS VIII - Hong Kong
The eighth annual Counter-eCrime Operations Summit (CeCOS VIII) was held in Hong Kong on April 8th, 9th and 10th, 2014. The event brings together global leaders from financial services, technology,...
View ArticleAnalysis: Spam report: March 2014
In March, spammers weren’t content to stick with traditional holiday-related advertising; they also used holiday-themed messages to con personal information from users of social networks.
View ArticleBlog: New Flash Player 0-day (CVE-2014-0515) used in watering-hole attacks
We received a sample of the first exploit on April 14, while a sample of the second came on April 16. The first exploit was initially recorded by KSN on April 9, when it was detected by a general...
View Article
More Pages to Explore .....