Be careful when selecting apps and when it comes to your much-loved devices. Read Full Article
Russian financial cybercrime: how it works
The Russian-language cybercrime market is known all over the world. Kaspersky Lab experts have been monitoring the Russian hacker underground since its emergence. In this review we analyze how financial cybercrime works. Read Full Article
Kaspersky Security Bulletin. 2016 Predictions
As the year comes to an end, we have an opportunity to take stock of how the industry has evolved and to cast our predictions for the coming years. The outlook for our rapidly evolving field of study is quite thought-provoking and will continue to present us with interesting challenges. Read Full Article
Spam and phishing in Q3 2015
In Q3 of 2015, the percentage of spam in email traffic accounted for 54.2%. The holiday season saw an increase in tourism-related malicious spam. Cybercriminals sent out fake notifications from well-known booking services, airlines and hotels, as well as emails from individuals. They typically included attached archives with different Trojan downloaders. Read Full Article
Beaches, carnivals and cybercrime: a look inside the Brazilian underground
Brazil ranks among the most dangerous countries for digital citizens. To understand what is going on in the Brazilian cybercriminal underground, we would like to take you on a journey into their world, to explore their attack strategy and their state of mind. Read Full Article
Microsoft Security Updates November 2015
Microsoft posted four critical bulletins today, along with another eight rated Important and lesser. Microsoft’s summary is at the Technet site. All in all, the software maker is patching a large number of vulnerabilities this month, with 37 CVE listed vulnerabilities being fixed with the four critical Bulletins alone. Read Full Article
Disbanding the ‘Zoo’
Virtualized environments are exceptionally flexible, manageable, fault-tolerant and cost-effective. However, a number of difficulties have to be overcome to protect them from external threats. If this is not done successfully, problems will inevitably arise. Read Full Article
The Power of V&V
A secure system – especially a system that is used to provide security – has to be trusted. But what underpins that trust? What proof do we have that the main components of our trusted system are implemented properly and won’t fail at a critical moment? Read Full Article
Surviving in an IoT-enabled world
Kaspersky Lab researchers have discovered coffeemakers that expose Wi-Fi network passwords, baby monitors that let hackers spy on you, and smartphone-controlled home security systems that can be fooled with a magnet. Read Full Article
Kaspersky DDoS Intelligence Report Q3 2015
In the third quarter of 2015 botnet-assisted DDoS attacks targeted victims in 79 countries around the world; 91.6% of targeted resources were located in 10 countries. The largest numbers of DDoS attacks targeted victims in China, the US and South Korea. The longest DDoS attack in Q3 2015 lasted for 320 hours. Read Full Article