Merging all Windows: what gives?
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
1278 articles
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
It’s like spammers aren’t even trying anymore. Still, be on the lookout for some of these typical tricks.
Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
451 Research has released a very complimentary overview of Kaspersky Lab’s current position and strengths. Here’s some commentary from their report.
IT departments take most of the responsibility for the company cybersecurity. However, how fair is it to charge them with 100% of responsibility for everything that happens there? Cynthia James shares her thoughts on this matter.
We hear a lot about so-called MITM attacks, but what is it in a nutshell? Let’s look at the “layman” explanation.
A visitor to Ferrari plant may find some of our rules too restrictive. Absolutely no cameras allowed inside, and we will need your signature to confirm that you were informed
Miniduke APT campaign is reactivated. The malware received a number of updates, and a large part of it is apparently intended to throw off researchers. Not exactly a successful endeavor.
Microsoft hit hard at No-IP.com, a dynamic DNS service which was in active use by cybercriminals. However, the “collateral damage” toll appeared to be a little too high.
New Kaspersky Lab’s survey shows VSB owners are well aware of IT threats, but their priorities lie elsewhere and the “immunity by obscurity” approach is a bit too common.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
Kaspersky Lab’s Intrusion Detection Systems now detects RDP brutforce attack attempts, and the statistics gathered since early June looks quite displeasing.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.
A new criminal campaign targeting a large European bank had been discovered earlier this year – the Luuuk. For one week, criminals managed to steal as much as 500k Euros from 190 accounts, before they hastily withdrew from sight.