Multiple-ATM Attacks
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
1055 articles
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
We have received a new patent for a method of countering code injection into a page opened by the client’s browser (a man-in-the-browser attack).
What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
Are you set up to block ransomware from jumping from one machine to your network?
Mobile banking is easy and convenient, but its adoption rate is still far from ideal.
Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.
Novel protection methods often evolve from older ones. Therefore, we decided to write about a method of malware detection that is tried and true — and also cutting-edge.
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.