Publications

Welcome to the Weblog

Welcome to the Weblog. The world of malware is technically complex, full of incident and mal-innovations, and keeps growing. The computer underground is looking for new intrusion and infection technologies. On the other hand the anti-virus companies keep developing protection. The e-arms race goes on full speed. We are here to explain the details.

Welcome to the Weblog. Hackers have mastered social engineering, cheating, fraud and phishing. They want to watch you from inside of your computer – we are here to inform you about most “successful” ways they do that. We’ll help you to be more protected today, than yesterday.

Welcome to the Weblog. The software giant(s) are under attack. The complexity and flexibility of networks, operating systems and applications are searched and abused by the hackers, virus writers, spammers and advertisers. The vendors do their best to release patched products, to install new and better walls against the flow of malware. We are here to present our expertise about these changes.

Welcome to the Weblog. You’re looking for answers? You’re afraid of being hacked? Our ideas will help.

Welcome to the Weblog

Your email address will not be published. Required fields are marked *

 

Reports

How to catch a wild triangle

How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones and iPads, including zero-day exploits, validators, TriangleDB implant and additional modules.

Subscribe to our weekly e-mails

The hottest research right in your inbox