Big Data vs. Big Fraud
Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.
Musician and technology enthusiast.
355 articles
Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.
A new criminal campaign targeting a large European bank had been discovered earlier this year – the Luuuk. For one week, criminals managed to steal as much as 500k Euros from 190 accounts, before they hastily withdrew from sight.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
Big Data concept is the new “big thing” of the last two or three years. While it promises a lot of advantages, there are voices of doubt and reservation. This week we are publishing a series of blog posts dedicated to Big Data, trying to find out what this “big” is about. Stay tuned!
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
This is a short excerpt from what is said to be unearthed medieval manuscript, describing a way of keeping secrets. While we are not sure it’s authentic, the method described seems quite useful today.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
OpenSSL reported six new vulnerabilities just eight weeks after Heartbleed. Does it mean that OpenSSL is heading for a disaster, or is it on its way to healing?
We’re pleased to announce another three accolades from an independent test lab. Dennis Technology Labs awarded our home and business products with AAA rating.
Apple has announced new versions of its operating system. OS X and iOS become closer, gradually merging into a single environment. How well is it protected?
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
Something very weird is going on with the popular free whole-disk encryption suite TrueCrypt. The story is still developing, but it does look like the suite ceases to exist right
Kaspersky Lab has launched new a Cyberstat portal, which shows how vast the present day cyberworld is and how quickly it expands.
In recent years, payment and banking services have been drawing closer attention of all sorts of criminals. The number of crimes related to stealing money via electronic communications keeps growing.
Earlier this month, I have spent a week in Protaras, a very nice resort town located at the Eastern part of Cyprus. It’s a brilliant place for a getaway especially
The season seems to be open: The dust hasn’t yet settled after the Heartbleed semi-apocalyptic revelation, and now eBay has confirmed that its security had been badly breached, with service
The famous indendent lab AV-Test has just completed another round of its comparative tests of security solutions – this time the ones intended for use within the virtual environments. Three
We continue our overview of the Kaspersky Security Center functionality and Software Assistant technologies in particular.
IT workers sometimes have to manage several dozen or even several hundred PCs at once, which makes an automated management solution absolutely necessary. Kaspersky Security Center’s Software Assistant makes accomplishing routine IT tasks extremely easy.
Habits are easy to form and hard to break in all facets of life, including technology usage. Sometimes a user’s habits may not seem so harmful, at least from their
Microsoft had to deal with a new less-than-pleasant vulnerability in Internet Explorer browser, which affected all of its versions starting with IE6 in all of its operational systems including the