Securelist – Information about Viruses, Hackers and Spam

 
Log in
Log In

English
  • English
  • Russian
  • Deutsch
  • Français
  • Español
  • Polski
  • Threats
    • Detected Objects
      • Detected Objects

        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Cloud Atlas: RedOctober APT is back in style
        • Tic Tac Toe with a twist
        • Tyupkin: manipulating ATM machines with malware
        • Gaps in corporate network security: ad networks
        • Sinkholing the Backoff POS Trojan
        • A new generation of ransomware
        • Haunted by APT
        • New gTLDs, same attacks
        • Versatile DDoS Trojan for Linux

        More articles about:

        • Detected Objects

        More about Detected Objects:

        • Encyclopedia
        • Statistics
    • Spam and Phishing
      • Spam and Phishing

        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Kaspersky Security Bulletin 2014. Malware evolution
        • Kaspersky Security Bulletin 2014. Overall statistics for 2014
        • Kaspersky Security Bulletin 2014. Predictions 2015
        • Phishing attack to target the clients of a Japanese bank
        • Spam and phishing in the Q3 of 2014
        • IT threat evolution Q3 2014
        • From the horse's mouth
        • A false choice: the Ebola virus or malware?
        • Spam in September 2014

        More articles about:

        • Spam and Phishing

        More about Spam and Phishing:

        • Encyclopedia
        • Statistics
    • Vulnerabilities and Hackers
      • Vulnerabilities and Hackers

        • Chthonic: a new modification of ZeuS
        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Kaspersky Security Bulletin 2014. Malware evolution
        • Kaspersky Security Bulletin 2014. Overall statistics for 2014
        • Kaspersky Security Bulletin 2014. Predictions 2015
        • IT threat evolution Q3 2014
        • The Darkhotel APT
        • Breaches in corporate network protection: access control
        • Shellshock and its early adopters
        • "Bash" (CVE-2014-6271) vulnerability – Q&A

        More articles about:

        • Vulnerabilities and Hackers

        More about Vulnerabilities and Hackers:

        • Encyclopedia
        • Statistics
    • Internal Threats
      • Internal Threats

        • Security holes in corporate networks: network vulnerabilities
        • The world at your fingertips… and theirs too
        • Wearable security: present and future
        • Trust. Trust. Trust
        • Abused Update of GOM Player Poses a Threat
        • Forecasts for 2014 - Expert Opinion
        • Kaspersky Security Bulletin 2013. Forecasts
        • Corporate Threats in 2013 - The Expert Opinion
        • PasswordsCon in Bergen
        • Discussing cybercrime laws in Sao Paulo

        More articles about:

        • Internal Threats

        More about Internal Threats:

        • Encyclopedia
        • Statistics
  • Categories
    • Events

        Events

      • AVAR 2014 - Australia
      • ekoParty Security Conference
      • Hack In The Box 2014 KUL
      • Virus Bulletin 2014: new times, same challenges
      • September's 3x CON: Part 2
      • September's 3x CON: Part 1
      • CTIA's Super Mobility Week 2014
      • 4th Latin American Security Analysts Summit in Cartagena
      • Internet Law Summer School 2014
      • August Update Tuesday - OneNote's First RCE, IE Memory Corruption
      • See more about Events

    • Incidents

        Incidents

      • 'Destover' malware now digitally signed by Sony certificates (updated)
      • Regin: nation-state ownage of GSM networks
      • From the horse's mouth
      • Russian-speaking fraud on Skype
      • Web-based attack targeting home routers, the Brazilian way
      • ZeroLocker won't come to your rescue
      • Haunted by APT
      • New gTLDs, same attacks
      • Miniduke is back: Nemesis Gemina and the Botgen Studio
      • Use the force Luuuk
      • See more about Incidents

    • Opinions

        Opinions

      • The art of finding Cyber-Dinosaur skeletons
      • Scammer of a Lonely Heart
      • Gaming the Security - The New Generation of Consoles
      • Securing Your Email Space
      • Cyber predators lurking
      • How to survive attacks that result in password leaks?
      • Traveling in an interesting time
      • We Need More Than Jelly Bean
      • OS X Mass Exploitation - Why Now?
      • 10 Simple Tips for Boosting The Security Of Your Mac
      • See more about Opinions

    • Research

        Research

      • Cloud Atlas: RedOctober APT is back in style
      • 'Destover' malware now digitally signed by Sony certificates (updated)
      • The 'Penquin' Turla
      • Sony/Destover: mystery North Korean actor's destructive and past network activity
      • The art of finding Cyber-Dinosaur skeletons
      • State of play: network devices facing bulls-eye
      • Regin: nation-state ownage of GSM networks
      • Law enforcement agencies in Tor: impact over the Dark Web
      • The Darkhotel APT
      • iOS trojan WireLurker: statistics and new Information
      • See more about Research

    • Security Bulletin

        Security Bulletin

        See more about Security Bulletin

    • Spam Test

        Spam Test

      • A false choice: the Ebola virus or malware?
      • Organ donation: home delivery
      • Changing characters: Something exotic in place of regular Latin script
      • Easter Bunnies for all Occasions
      • Would You Like Some Zeus With Your Coffee?
      • The Omnipresent Dad
      • Fraudsters are playing a different kind of card game
      • Mystery Shopper: Beware of Frauds
      • The 'Nigerian' Vow: Our Promises - Your Money
      • Your Facebook Account Has Won a Prize!
      • See more about Spam Test

    • Virus Watch

        Virus Watch

      • Chthonic: a new modification of ZeuS
      • A nightmare on malware street
      • Brazilian Trojan Bankers – now on your Android Play Store!
      • Android NFC hack allow users to have free rides in public transportation
      • Android Backdoor disguised as a Kaspersky mobile security app
      • Android Worm on Chinese Valentine's day
      • elasticsearch Vuln Abuse on Amazon Cloud and More for DDoS and Profit
      • Fake antivirus - attack of the clones
      • Stealing from Wallets
      • Garfield Garfield True, or The Story Behind Syrian Malware, .NET Trojans and Social Engineering
      • See more about Virus Watch

    • Webcasts

        Webcasts

      • Forecasts for 2014 - Expert Opinion
      • Corporate Threats in 2013 - The Expert Opinion
      • Top security stories of 2013 - the expert opinion
      • Lab Matters - The death of browser trust
      • Lab Matters - The threat from P2P botnets
      • Lab Matters - Cloudy with a chance of stolen data
      • Lab Matters - Brazil Banks in the Malware Glare
      • Lab Matters - Java exploits percolate
      • Lab Matters - Analyzing the Android security ecosystem
      • Lab Matters - Cyber crime and cyber war in Latin America
      • See more about Webcasts

    • Website archive

        Website archive

        See more about Website archive

  • Tags
    • botnets

        botnets

      • Stuxnet: Zero victims
      • The Darkhotel APT
      • Shellshock and its early adopters
      • elasticsearch Vuln Abuse on Amazon Cloud and More for DDoS and Profit
      • See more about botnets

    • Cyber espionage

        Cyber espionage

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • Stuxnet: Zero victims
      • The Darkhotel APT
      • BE2 custom plugins, router abuse, and target profiles
      • See more about Cyber espionage

    • Cyber weapon

        Cyber weapon

      • Stuxnet: Zero victims
      • Securmatica XXV
      • SyScan 2014
      • RootedCON V
      • See more about Cyber weapon

    • Internet Banking

        Internet Banking

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • IT threat evolution Q3 2014
      • Attacks against Boletos
      • Well, that escalated quickly
      • See more about Internet Banking

    • Mobile Malware

        Mobile Malware

      • Kaspersky Security Bulletin 2014. Malware evolution
      • Kaspersky Security Bulletin 2014. Overall statistics for 2014
      • Kaspersky Security Bulletin 2014. Predictions 2015
      • AVAR 2014 - Australia
      • See more about Mobile Malware

    • proactive protection

        proactive protection

      • Use the force Luuuk
      • Cryptolocker Wants Your Money!
      • Ekoparty Security Conference 2013
      • Lab Matters - The Evolution of Anti-Malware Protection
      • See more about proactive protection

    • Social Engineering

        Social Engineering

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • From the horse's mouth
      • Breaches in corporate network protection: access control
      • Russian-speaking fraud on Skype
      • See more about Social Engineering

    • social networks

        social networks

      • Internet predators
      • Social network frauds
      • Your Facebook Account Has Won a Prize!
      • Malicious Chrome extensions: a cat and mouse game
      • See more about social networks

    • Targeted Attacks

        Targeted Attacks

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • Regin: nation-state ownage of GSM networks
      • Stuxnet: Zero victims
      • The Darkhotel APT
      • See more about Targeted Attacks

    • Show all tags

        Show all tags

        See more about Show all tags

  • Encyclopedia
  • Statistics
  • Descriptions
Menu
  • Threats
    • Detected Objects
      • Detected Objects

        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Cloud Atlas: RedOctober APT is back in style
        • Tic Tac Toe with a twist
        • Tyupkin: manipulating ATM machines with malware
        • Gaps in corporate network security: ad networks
        • Sinkholing the Backoff POS Trojan
        • A new generation of ransomware
        • Haunted by APT
        • New gTLDs, same attacks
        • Versatile DDoS Trojan for Linux

        More articles about:

        • Detected Objects

        More about Detected Objects:

        • Encyclopedia
        • Statistics
    • Spam and Phishing
      • Spam and Phishing

        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Kaspersky Security Bulletin 2014. Malware evolution
        • Kaspersky Security Bulletin 2014. Overall statistics for 2014
        • Kaspersky Security Bulletin 2014. Predictions 2015
        • Phishing attack to target the clients of a Japanese bank
        • Spam and phishing in the Q3 of 2014
        • IT threat evolution Q3 2014
        • From the horse's mouth
        • A false choice: the Ebola virus or malware?
        • Spam in September 2014

        More articles about:

        • Spam and Phishing

        More about Spam and Phishing:

        • Encyclopedia
        • Statistics
    • Vulnerabilities and Hackers
      • Vulnerabilities and Hackers

        • Chthonic: a new modification of ZeuS
        • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
        • Kaspersky Security Bulletin 2014. Malware evolution
        • Kaspersky Security Bulletin 2014. Overall statistics for 2014
        • Kaspersky Security Bulletin 2014. Predictions 2015
        • IT threat evolution Q3 2014
        • The Darkhotel APT
        • Breaches in corporate network protection: access control
        • Shellshock and its early adopters
        • "Bash" (CVE-2014-6271) vulnerability – Q&A

        More articles about:

        • Vulnerabilities and Hackers

        More about Vulnerabilities and Hackers:

        • Encyclopedia
        • Statistics
    • Internal Threats
      • Internal Threats

        • Security holes in corporate networks: network vulnerabilities
        • The world at your fingertips… and theirs too
        • Wearable security: present and future
        • Trust. Trust. Trust
        • Abused Update of GOM Player Poses a Threat
        • Forecasts for 2014 - Expert Opinion
        • Kaspersky Security Bulletin 2013. Forecasts
        • Corporate Threats in 2013 - The Expert Opinion
        • PasswordsCon in Bergen
        • Discussing cybercrime laws in Sao Paulo

        More articles about:

        • Internal Threats

        More about Internal Threats:

        • Encyclopedia
        • Statistics
  • Categories
    • Events

        Events

      • AVAR 2014 - Australia
      • ekoParty Security Conference
      • Hack In The Box 2014 KUL
      • Virus Bulletin 2014: new times, same challenges
      • September's 3x CON: Part 2
      • September's 3x CON: Part 1
      • CTIA's Super Mobility Week 2014
      • 4th Latin American Security Analysts Summit in Cartagena
      • Internet Law Summer School 2014
      • August Update Tuesday - OneNote's First RCE, IE Memory Corruption
      • See more about Events

    • Incidents

        Incidents

      • 'Destover' malware now digitally signed by Sony certificates (updated)
      • Regin: nation-state ownage of GSM networks
      • From the horse's mouth
      • Russian-speaking fraud on Skype
      • Web-based attack targeting home routers, the Brazilian way
      • ZeroLocker won't come to your rescue
      • Haunted by APT
      • New gTLDs, same attacks
      • Miniduke is back: Nemesis Gemina and the Botgen Studio
      • Use the force Luuuk
      • See more about Incidents

    • Opinions

        Opinions

      • The art of finding Cyber-Dinosaur skeletons
      • Scammer of a Lonely Heart
      • Gaming the Security - The New Generation of Consoles
      • Securing Your Email Space
      • Cyber predators lurking
      • How to survive attacks that result in password leaks?
      • Traveling in an interesting time
      • We Need More Than Jelly Bean
      • OS X Mass Exploitation - Why Now?
      • 10 Simple Tips for Boosting The Security Of Your Mac
      • See more about Opinions

    • Research

        Research

      • Cloud Atlas: RedOctober APT is back in style
      • 'Destover' malware now digitally signed by Sony certificates (updated)
      • The 'Penquin' Turla
      • Sony/Destover: mystery North Korean actor's destructive and past network activity
      • The art of finding Cyber-Dinosaur skeletons
      • State of play: network devices facing bulls-eye
      • Regin: nation-state ownage of GSM networks
      • Law enforcement agencies in Tor: impact over the Dark Web
      • The Darkhotel APT
      • iOS trojan WireLurker: statistics and new Information
      • See more about Research

    • Security Bulletin

        Security Bulletin

        See more about Security Bulletin

    • Spam Test

        Spam Test

      • A false choice: the Ebola virus or malware?
      • Organ donation: home delivery
      • Changing characters: Something exotic in place of regular Latin script
      • Easter Bunnies for all Occasions
      • Would You Like Some Zeus With Your Coffee?
      • The Omnipresent Dad
      • Fraudsters are playing a different kind of card game
      • Mystery Shopper: Beware of Frauds
      • The 'Nigerian' Vow: Our Promises - Your Money
      • Your Facebook Account Has Won a Prize!
      • See more about Spam Test

    • Virus Watch

        Virus Watch

      • Chthonic: a new modification of ZeuS
      • A nightmare on malware street
      • Brazilian Trojan Bankers – now on your Android Play Store!
      • Android NFC hack allow users to have free rides in public transportation
      • Android Backdoor disguised as a Kaspersky mobile security app
      • Android Worm on Chinese Valentine's day
      • elasticsearch Vuln Abuse on Amazon Cloud and More for DDoS and Profit
      • Fake antivirus - attack of the clones
      • Stealing from Wallets
      • Garfield Garfield True, or The Story Behind Syrian Malware, .NET Trojans and Social Engineering
      • See more about Virus Watch

    • Webcasts

        Webcasts

      • Forecasts for 2014 - Expert Opinion
      • Corporate Threats in 2013 - The Expert Opinion
      • Top security stories of 2013 - the expert opinion
      • Lab Matters - The death of browser trust
      • Lab Matters - The threat from P2P botnets
      • Lab Matters - Cloudy with a chance of stolen data
      • Lab Matters - Brazil Banks in the Malware Glare
      • Lab Matters - Java exploits percolate
      • Lab Matters - Analyzing the Android security ecosystem
      • Lab Matters - Cyber crime and cyber war in Latin America
      • See more about Webcasts

    • Website archive

        Website archive

        See more about Website archive

  • Tags
    • botnets

        botnets

      • Stuxnet: Zero victims
      • The Darkhotel APT
      • Shellshock and its early adopters
      • elasticsearch Vuln Abuse on Amazon Cloud and More for DDoS and Profit
      • See more about botnets

    • Cyber espionage

        Cyber espionage

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • Stuxnet: Zero victims
      • The Darkhotel APT
      • BE2 custom plugins, router abuse, and target profiles
      • See more about Cyber espionage

    • Cyber weapon

        Cyber weapon

      • Stuxnet: Zero victims
      • Securmatica XXV
      • SyScan 2014
      • RootedCON V
      • See more about Cyber weapon

    • Internet Banking

        Internet Banking

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • IT threat evolution Q3 2014
      • Attacks against Boletos
      • Well, that escalated quickly
      • See more about Internet Banking

    • Mobile Malware

        Mobile Malware

      • Kaspersky Security Bulletin 2014. Malware evolution
      • Kaspersky Security Bulletin 2014. Overall statistics for 2014
      • Kaspersky Security Bulletin 2014. Predictions 2015
      • AVAR 2014 - Australia
      • See more about Mobile Malware

    • proactive protection

        proactive protection

      • Use the force Luuuk
      • Cryptolocker Wants Your Money!
      • Ekoparty Security Conference 2013
      • Lab Matters - The Evolution of Anti-Malware Protection
      • See more about proactive protection

    • Social Engineering

        Social Engineering

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • From the horse's mouth
      • Breaches in corporate network protection: access control
      • Russian-speaking fraud on Skype
      • See more about Social Engineering

    • social networks

        social networks

      • Internet predators
      • Social network frauds
      • Your Facebook Account Has Won a Prize!
      • Malicious Chrome extensions: a cat and mouse game
      • See more about social networks

    • Targeted Attacks

        Targeted Attacks

      • Kaspersky Security Bulletin 2014. A look into the APT crystal ball
      • Regin: nation-state ownage of GSM networks
      • Stuxnet: Zero victims
      • The Darkhotel APT
      • See more about Targeted Attacks

    • Show all tags

        Show all tags

        See more about Show all tags

  • Encyclopedia
  • Statistics
  • Descriptions

Securelist Archive

Blogs

  • All Articles
  • Blogs
  • Analysis
Virus Watch

Chthonic: a new modification of ZeuS

December 18, 2014, 11:00 am. Yury Namestnikov, Vladimir Kuskov, Oleg Kupreev
7263
1

In the fall of 2014, we discovered a new banking Trojan, which caught our attention for two reasons… Read Full Article

Research

Cloud Atlas: RedOctober APT is back in style

December 10, 2014, 10:03 am. GReAT
10440
2

Two years ago, we published our research into RedOctober, a complex cyber-espionage operation targeting diplomatic embassies worldwide. We named it RedOctober because we started this investigation in October 2012, an unusually hot month. Read Full Article

Incidents Research Security policies

'Destover' malware now digitally signed by Sony certificates (updated)

December 9, 2014, 7:47 pm. GReAT
13835
4

Several days ago, our products detected an unusual sample from the Destover family. Read Full Article

Research

The 'Penquin' Turla

December 8, 2014, 7:05 pm. Kurt Baumgartner, Costin Raiu
14848
23

In November 2014, an interesting malicious sample was uploaded to a multiscanner service. This immediately triggered our interest because it appears to represent a previously unknown piece of a larger puzzle. Read Full Article

Research

Sony/Destover: mystery North Korean actor's destructive and past network activity

December 4, 2014, 7:53 pm. Kurt Baumgartner
16721
0

This week, for the first time ever, the FBI issued a media FLASH to warn businesses about the destructive wiper activity that was used in the attack on Sony Pictures Entertainment. Read Full Article

Opinions Project Research

The art of finding Cyber-Dinosaur skeletons

December 3, 2014, 3:25 pm. GReAT
9966
2

Following the release of our report on the Regin nation-state cyber operation, questions were raised about whether anti-malware companies deliberately withheld information – and detections – at the request of governments and customers. Read Full Article

Phishing

Phishing attack to target the clients of a Japanese bank

November 28, 2014, 9:00 am. Tatyana Shcherbakova
7235
1

Most phishing emails that aim to steal bank and e-payment data are written in English. However, we are seeing more and more fraudulent messages written in other languages. Read Full Article

Research

State of play: network devices facing bulls-eye

November 26, 2014, 9:00 am. Marta Janus
6044
0

A long time has passed since we published our analysis of threats for home network devices. Since then, the situation has significantly changed – alas, not for the better. Read Full Article

Security policies

Guidelines for securing your home

November 26, 2014, 9:00 am. David Jacoby
6340
2

Our homes today look more like small offices. We have tons of different devices connected to our network, everything from storage devices and network equipment to wireless network printers. Read Full Article

Incidents Research

Regin: nation-state ownage of GSM networks

November 24, 2014, 2:00 pm. GReAT
10561
10

A sophisticated group known as Regin has targeted high-profile entities around the world. Regin is one of the most sophisticated attack platforms we have ever analysed. The ability to penetrate and monitor GSM networks is the most unusual aspect of these operations. Read Full Article

Older posts

  • Categories
  • Date
  • Tags
  • Author
  • Events
  • Humour
  • Incidents
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware Evolution Monthly
  • Mobile
  • Monthly Malware Statistics
  • Monthly Spam Reports
  • News
  • Opinions
  • Phishing
  • Project
  • Publications
  • Quarterly Malware Reports
  • Quarterly Spam Reports
  • Research
  • Security policies
  • Software
  • Spam Test
  • User Advice
  • Virus Watch
  • Webcasts
<
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • 0days
  • ATM attacks
  • Banker
  • Base64
  • Cyber Spying
  • DNS Amplification
  • DNSChanger
  • DoS-атаки
  • DoS-attack
  • Dropbox
  • Excel
  • Google glass
  • Latin America
  • Machete
  • Macro
  • Malware Descriptions. Cybercrime Legislation
  • NFC
  • Office
  • POS malware
  • public transportation
  • Python
  • ransomeware
  • RAT Trojan
  • Router
  • Seculert
  • SpyEye
  • Syria
  • TLD
  • Victim information
  • Zynga
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertisement
  • Adware
  • Amazon
  • AMD
  • Android
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iPhone
  • Apple MacOS
  • Application Control
  • APT
  • ARM
  • ATM attacks
  • AT&T
  • Backdoor
  • Backup
  • Bagle
  • Banker
  • Base64
  • Bitcoin
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Boran
  • botnets
  • Bozori
  • Broadband
  • Browser Plugins
  • Buffer Overflows
  • Cabir
  • Campaigns
  • Certificate authorities
  • Chronopay
  • Cloud
  • Cloud Computing
  • Comodo
  • Conferences
  • Content Filtering
  • Copyright
  • Corporative Threats
  • Credit Cards
  • Crimeware
  • CVE
  • Cyber espionage
  • Cyber Spying
  • Cyber War
  • Cyber weapon
  • Cybercrime
  • Cybercrime Legislation
  • Darknet
  • Data Encryption
  • Data leaks
  • Data loss
  • Data Protection
  • DDoS
  • Default Deny
  • Dell
  • Digital Certificates
  • DNS
  • DNS Amplification
  • DNSChanger
  • DoS-атаки
  • DoS-attack
  • DoS-attacks
  • Dropbox
  • Duqu
  • Duts
  • eBay
  • Electronic Payments
  • Email
  • EMC
  • Excel
  • Exhibitions
  • Exploit Kits
  • Facebook
  • False Alarms
  • FBI
  • File Sharing
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Fraud
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hackers Attacks
  • History of Malware
  • Hoaxes
  • HTC
  • Identity Theft
  • Iksmas
  • Immunity
  • Induc
  • Industrial control systems
  • Infected Files and Devices
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • Internet Safety
  • IOActive
  • JavaScript
  • Kaspersky Security Network (KSN)
  • Kelvir
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • Latin America
  • Law Enforcement
  • LdPinch
  • LinkedIn
  • Linux
  • Location-based services
  • LoveLetter
  • Machete
  • Macro
  • Madi
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • Malware Descriptions
  • Malware Descriptions. Cybercrime Legislation
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • Mastercard
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Internet Explorer
  • Microsoft Windows
  • Microsoft Word
  • MITM
  • Mobile Attacks
  • Mobile Malware
  • Mobile security
  • Money theft
  • Motorola
  • Mozilla Foundation
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Letters
  • Nigerian Scam
  • Nigerian Spam
  • Non-Windows Malware
  • Novell
  • Numerology
  • Nyxem
  • Obfuscation
  • Office
  • Offline Phishing
  • Onion
  • Online Games
  • Oracle
  • P2P networks
  • Passwords
  • Patch tuesday
  • Paypal
  • Phishing
  • PHP
  • plugins
  • Polymorphism
  • POS malware
  • Privacy
  • proactive protection
  • Proof-of-Concept
  • Public key infrastructure
  • public transportation
  • Python
  • QR code
  • ransomeware
  • Ransomware
  • RAT Trojan
  • RedHat
  • RFID
  • Rogue Security Solutions
  • Rootkits
  • Rootkits. Targeted Attacks
  • Router
  • RSA
  • Safari
  • Sality
  • Santy
  • Sasser
  • Script
  • Script Worms
  • Search Engines
  • Seculert
  • Secunia
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shamoon
  • Shellshock
  • Sinowal
  • Skype
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social Engineering. Offline Phishing
  • social networks
  • Sony
  • Spam
  • Spam and the law
  • Spam Letters
  • spam report
  • Spam Statistics
  • Spammer techniques
  • Spearphishing
  • SpyEye
  • Spyware
  • Stuxnet
  • Sun Java
  • SunOS / Solaris
  • Syria
  • Tablet
  • Targeted Attacks
  • TDSS
  • Tematic Spam
  • Tips
  • TLD
  • TOR
  • Trainings
  • Trojan
  • Trojan-Bankers
  • Trusted Environment
  • Twitter
  • Ubuntu
  • VBMania
  • Verisign
  • Verizon
  • Victim information
  • Virtualization
  • Virus Writers Wars
  • Virut
  • VISA
  • VMWare
  • Vulnerabilites
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerability Statistics
  • wardriving
  • Warezov
  • Waterhole attacks
  • Wearable devices
  • Weblogs
  • Website Hacks
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • Xen
  • XSS
  • Zafi
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Zynga
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Armstrong, Tim
  • Aseev, Eugene
  • Bakhmutov, Andrey
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Chebyshev, Victor
  • Coursen, Shane
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Fedotov, Nikolay
  • Garnaeva, Maria
  • Godwood, Ben
  • Golovanov, Sergey
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Ignatiev, Konstantin
  • Ishimaru, Suguru
  • Ivanov, Anton
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kaspersky, Eugene
  • Kivva, Anton
  • Kolotinsky, Evgeny
  • Kostin, Andrey
  • Kruglov, Kirill
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Roman
  • Lab, Kaspersky
  • Ladikov, Andrey
  • Larkina, Anna
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Markov, Konstantin
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mimosso, Michael
  • Monastyrsky, Alexey
  • Namestnikova, Maria
  • Nazarov, Denis
  • Nikishin, Andrey
  • Novikov, Sergey
  • Olsen, Bo
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Rubinstein, Maria
  • Rusakov, Vyacheslav
  • Sapronov, Konstantin
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shvetsov, Dmitry
  • Soumenkov, Igor
  • Tarakanov, Dmitry
  • Unuchek, Roman
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vlasova, Anna
  • Volodina, Anna
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Pavel
  • Zhang, Vigi
  • Ziarek, Maciej


© 1997-2014 Kaspersky Lab ZAO. All Rights Reserved. Registered trademarks and service marks are the property of their respective owners.

Contact us | Read our privacy policy

Categories

  • Events
  • Incidents
  • Opinions
  • Research
  • Spam Test
  • Virus Watch
  • Webcasts

Pages

  • Contacts
  • RSS feed

Follow Us

  • Twitter
  • Facebook
  • Google+
  • LinkedIn
  • YouTube
  • RSS
  • Email