Yesterday, Jens atom Steube, which most people know as the author of hashcat – a GPU accelerated password recovery tool, released his Gauss cracker as open source software under a GPL license Read Full Article
Spam in November 2012
Spammers and scammers always take advantage of holidays and hot news. As we approach the Christmas and New Year holidays, spammers now have more reasons and opportunities to advertise their goods and services in spam. Read Full Article
Kaspersky Security Bulletin 2012. Cyber Weapons
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu. However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails Read Full Article
Malware in the Amazon App Store
Malware in the Amazon app store Read Full Article
GrooveMonitor: Another Wiper Copycat?
Another wiper-like malware has been discovered. Read Full Article
Carberp-in-the-Mobile
We previously wrote several times about Man-in-the-Mobile attacks which aim to steal mTANs sent via SMS. For a long time, only two families of such malware have been known: ZeuS-in-the-Mobile (ZitMo) and SpyEye-in-the-Mobile (SpitMo). ZitMo and SpitMo work together with… Read Full Article
IT security in 2030 – only humans will be the same
It is clear that any attempt to predict the IT security landscape in 2030 will have to be a forecast of security and society in general. IT is now almost everywhere, and its scope will only increase in the future. Read Full Article
December 2012 Microsoft Security Bulletins
The folks at the Microsoft Security Response Center are winding down 2012 with another full release of seven Security Bulletins containing fixes for memory corruption on application, server, and system code along with a Certificate Bypass problem and set of… Read Full Article
WiFi study in Dubai
Why in Dubai? First, I was there recently. Second, Dubai has become one of the most important cities in the world for holding IT conferences. All statistics are based on around 3 thousand found WiFi access points. Let’s begin with… Read Full Article
Kaspersky Security Bulletin 2012. The overall statistics for 2012
This section of the report forms part of the Kaspersky Security Bulletin 2012 and is based on data obtained and processed using Kaspersky Security Network (KSN). Read Full Article