data Survey: manufacturing businesses’ intellectual property gets lost to security breaches According to a recent Kaspersky Lab and B2B International survey, 21% manufacturing businesses lost their intellectual property to security breaches. In most cases malware was the cause, although other problems were named.
PC neglect Stuxnet’s “hole”: the vulnerability is still around Four years after the discovery of the Stuxnet worm, the primary vulnerability it had been exploiting is still around. This is mainly the problem of poorly maintained Windows XP PCs and servers, most likely inhabited by worms. In the interconnected world a neglected PC or a server is a possible problem for many people.
IT education Can we beat social engineering? Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
e-commerce fraud Few companies are interested in protecting endpoint devices of their clients Few companies are interested in protecting their users’ endpoint devices, even though it’s one of the most vulnerable points in the financial transaction chain. At the same time, users expect payment operators to reimburse their funds in instances of successful fraud.
analysis Epic Turla – catching the reptile’s tail Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.
business IT security IT Security Risks Survey 2014: None is spared Kaspersky Lab has released a new IT Security Risks Survey, conducted in 2013-2014 together with B2B International. Facts and figures show that security situations in businesses improved very little, if at all. Small and mid-sized businesses still have their IT strategy low on their priorities list.
Cybersecurity Critters evolving: Trojans on the rise in Q2 Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
Business Threats to medium-sized business: visualized A visual representation of a problem appears just a bit more meaningful, and at the same time more comprehensible, than large sheets of texts. Here is a big (or not so big) picture of threats to medium-sized businesses.
Crouching Yeti Crouching Yeti: got caught anyway Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
security Windows merge: so what about security, after all? As a security vendor, we at Kaspersky Lab have to foresee possible problems stemming from essentially good things. Serious transformations in the software market bring both new advantages, but also new problems and challenges, to which we need to pay attention.
malware Windows merge: same base, same malware? The same code base of Windows for various devices means also that the same malware can hypothetically attack all of them.
Cybersecurity Merging all Windows: does it mean shorter lifecycles? Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
Cybersecurity Merging all Windows: what gives? Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
e-mail Is it possible to beat spam? Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
botnets Hunting the Hydra: why Gameover ZeuS botnet is here to stay Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
Cybersecurity A healthy equinophobia: Trojan horses explained “Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
junk mail Spam the scam: unimaginative in large numbers It’s like spammers aren’t even trying anymore. Still, be on the lookout for some of these typical tricks.
backdoors Knocking on a backdoor: what’s behind the graphic cybersecurity term Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
botnets Security vendors on their own: large entities take on botnets Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
Cybersecurity DDoS broken apart: when they all start shouting at once DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
451 Research 451 Research on Kaspersky Lab: quick response as a key differentiator 451 Research has released a very complimentary overview of Kaspersky Lab’s current position and strengths. Here’s some commentary from their report.