Events

Internet Law Summer School 2014

The end of each summer always gets me excited, because one of my favorite events is taking place: the Internet Law Summer School organized by ELSA – The European Law Students’ Association. This summer school is the perfect opportunity to meet young, smart and talented law students and discuss privacy, security or internet threats with them.

These students will become the lawyers, prosecutors and judges of tomorrow – so it’s very important for them to get them in touch with the real world problems of fighting cyber-crime and ensuring the security and privacy of personal data.

Law students from 12 European countries

Fighting cyber-crime through all means possible has always been our mission here at Kaspersky Lab. But we can’t do this alone. Sure, our products and technologies are protecting hundreds of millions of users worldwide, but stopping cyber-crime is something we can not do just by ourselves.

Cyber-crime is a huge problem worldwide and it is always very frustrating to see that those persons responsible for cyber-attacks very rarely have to face the consequences of their actions. In the last 24 hours, we’ve discovered more than 300.000 new viruses, trojans and worms. How many cyber-criminals have received prison sentences in the same 24 hours period?

The reason why cyber-criminals usually get away with their crimes is that both law enforcement and judicial systems around the world are having a hard time trying to keep up with the evolution of technology, or threats on the internet specifically. This is why it’s so important to train law enforcement officers. This is why it’s so important to train judges and prosecutors. At the end of the day, they are the ones actually fighting cyber-crime by sending cyber-criminals to jail.

This year, the main focus of the summer school was on freedom of media and private life. I focused on the privacy and security side, of course – with a workshop titled “Private life in cyberspace – securing your personal data online”.

My main message? Trust and use encryption in order to thwart prying eyes – but don’t forget that no matter how good the encryption you’re using is, an insecure operating system will always offer the attacker the chance of accessing your data before it gets encrypted. You can’t have privacy without first having good security.

 

Internet Law Summer School 2014

Your email address will not be published. Required fields are marked *

 

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox