Securelist – Kaspersky Lab’s cyberthreat research and reports
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions
Menu
  • Threats
    • Detected Objects
    • Spam and Phishing
    • Vulnerabilities and Hackers
    • Internal Threats
  • Categories
    • Research
    • APT reports
    • Mobile threats
    • Incidents
    • Security Bulletin
    • Spam and phishing
    • Publications
    • Malware reports
    • Opinion
    • All categories
  • Tags
    • APT
    • Botnets
    • Cyber espionage
    • Cyber weapon
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Social networks
    • Targeted Attacks
    • Show all tags
  • Encyclopedia
  • Statistics
  • Descriptions

Securelist Archive / Analysis

Date: September 2010

no-image
Publications

The antivirus weather forecast: cloudy

September 30, 2010, 12:00 pm.
Yury Mashevsky

These days, when you scan Internet resources or take part in discussions, you inevitably come across materials and comments related to the use of cloud technology in antivirus protection. Read Full Article

no-image
Publications

Online gaming fraud: the evolution of the underground economy

September 28, 2010, 11:13 am.
Christian Funk

Whatever type of game you take as an example – a card game, a board game, or a game of cops and robbers – attempts to cheat will be as old as the game itself. Read Full Article

no-image
Incidents

Myrtus and Guava: the epidemic, the trends, the numbers

September 26, 2010, 10:28 pm.
Alexander Gostev

Over the last few days, Stuxnet has been covered extensively in the mass media. And it’s been covered differently by different sources. “Iran”, “Bushehr nuclear plant” and “cyber-weapon” are phrases which are already inexorably linked to Stuxnet. Read Full Article

no-image
Incidents

Another live XSS vulnerability

September 26, 2010, 12:02 am.
Fabio Assolini

Another live XSS vulnerability in Orkut affected more than 180,000 users in Brazil. Read Full Article

no-image
Research

Google, Mozilla and now Opera… Who’s next?

September 23, 2010, 8:24 pm.
Dmitry Bestuzhev

There have been several reports about malware hosted on Mozilla and Google code servers. Now we also found malware hosted on My Opera community servers. Read Full Article

no-image
Spam and phishing reports

Spam Report: August 2010

September 22, 2010, 2:16 pm.
Maria Namestnikova

The amount of spam detected in mail traffic averaged 82.6% in August 2010. A low of 79.4% was recorded on 2 August, with a peak value of 89.7% being reached on 7 August. Read Full Article

no-image
Incidents

Live Twitter XSS

September 21, 2010, 3:41 pm.
Georg Wicherski

There is a new, actively exploited XSS on Twitter. Read Full Article

no-image
Webcasts

Targeted attacks: businesses under threat

September 20, 2010, 3:59 pm.
Sergey Novikov

As the subject of targeted attacks remains one of the industry’s most hotly discussed topics, and the waves of such attacks appear to be relentless, our experts, Kostin and Magnus, together with the team, decided to continue on with the theme. Read Full Article

no-image
Incidents

iPhone Jailbreaking, Greenpois0n and SHAtter Trojans

September 20, 2010, 3:24 pm.
Costin Raiu

With Apple fans waiting for the release of the Greenpois0n jailbreaking tool, the cybercriminals are exploiting the fuss with “Greenpois0n” trojans. Read Full Article

no-image
Research

Pegel now in banners

September 17, 2010, 7:11 pm.
Eugene Aseev

Pegel now in banners Read Full Article

Older posts

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware reports
  • Mobile threats
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing
  • Spam and phishing reports
  • Virus Watch
  • Webcasts
<
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • AES-256
  • Audiocapture
  • Banloader
  • Base64
  • Biometric authentication
  • Bitcoins
  • Comparative Tests
  • DBIR APT
  • Desktop
  • Destructive attackers
  • Detected Objects
  • DNS Amplification
  • Dropbox
  • Espionage
  • Excel
  • Google glass
  • JAR
  • Mcrosoft Office
  • Methods of authentication
  • No More Ransom
  • OS X
  • PAC
  • PlugX
  • Python
  • Qt
  • RaaS
  • Remsec
  • Screenshot
  • Surveillance
  • TLD
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertisement
  • Adware
  • AES-256
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • APT criminal
  • Arabic Malware
  • ARM
  • AT&T
  • ATM
  • ATM attacks
  • Audiocapture
  • Backdoor
  • Backup
  • BadRabbit
  • Bagle
  • Banking Trojan
  • Banloader
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitcoins
  • Bitscout
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brasil
  • Brazil
  • Browser Plugins
  • BSides
  • BTC
  • Buffer Overflows
  • Cabir
  • Campaigns
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chronopay
  • CIL
  • Cloud
  • Cloud Computing
  • code injection
  • Comodo
  • Comparative Tests
  • Conferences
  • connected car
  • Content Filtering
  • Copyright
  • Corporative Threats
  • Credit Cards
  • Crimeware
  • Cross-platform malware
  • Crypto
  • Cryptocurrencies
  • cryptocurrency
  • CVE
  • Cyber espionage
  • Cyber War
  • Cyber weapon
  • Cybercrime
  • Cybercrime Legislation
  • Cyberespionage
  • Darknet
  • Data Encryption
  • Data leaks
  • Data loss
  • Data Protection
  • DBIR APT
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Desktop
  • Destructive attackers
  • Detected Objects
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DoS
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • Duts
  • eBay
  • Electronic Payments
  • Email
  • Emotet
  • Encryption
  • Equation
  • Espionage
  • Excel
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • FakeCry
  • False Alarms
  • false positives
  • File Sharing
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Forecast
  • Forensic
  • Forensics
  • Fraud
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hackers Attacks
  • Hacking Team
  • HDD Rootkit
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • ICS
  • Identity Theft
  • Induc
  • Industrial control systems
  • industrial software
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • Internet Safety
  • IOActive
  • IOC
  • iOS
  • IoT
  • JAR
  • Java
  • JavaScript
  • Joint ventures
  • Json
  • Kaspersky Lab
  • Kaspersky Security Network (KSN)
  • KasperskyOS
  • Kelvir
  • Keylogger
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Location-based services
  • LoveLetter
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • malware description
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • marketplace
  • Mastercard
  • MBR
  • Mcrosoft Office
  • messengers
  • Methods of authentication
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • Mobile Attacks
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money theft
  • Motorola
  • Mozilla Foundation
  • MSIL
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Scam
  • Nigerian Spam
  • No More Ransom
  • Non-Windows Malware
  • Novell
  • Numerology
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Onion
  • Online Games
  • open source
  • Oracle
  • OS X
  • OSX
  • P2P networks
  • PAC
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • PHP
  • Plugins
  • PlugX
  • Polymorphism
  • POS malware
  • PowerShell
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • PUPs
  • Python
  • QR code
  • Qt
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Remsec
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • RSA
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Satellite
  • Scada
  • Scam
  • Screenshot
  • Script
  • Script Worms
  • Search Engines
  • Seculert
  • Secunia
  • secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Signed malware
  • Simda
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Software
  • Sony
  • Spam
  • Spam and the law
  • Spam Letters
  • Spam report
  • Spam Statistics
  • Spammer techniques
  • Spear-Phishing
  • Spearphishing
  • SpyEye
  • Spyware
  • SSL
  • steganography
  • Stuxnet
  • Sun Java
  • SunOS / Solaris
  • supply-chain attack
  • Surveillance
  • Syria
  • Targeted attack
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Tematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • Tools
  • TOR
  • Trainings
  • Trojan
  • Trojan-Bankers
  • Trojan-clicker
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBE
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • Virut
  • VISA
  • VMWare
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerabilities and Hackers
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Weblogs
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Windows
  • Windows 10
  • Windows Mobile
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • zero-day exploit
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky Lab,
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Markov, Konstantin
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Novikov, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Parinov, Denis
  • Parys, Bart
  • Pintiysky, Vladislav
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Shabab, Noushin
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sinitsyn, Fedor
  • Slepogin, Nikita
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Unuchek, Roman
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Victoria
  • Vlasova, Anna
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Sergey
  • Zelensky, Pavel
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2018 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email