Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
435 articles
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term “RAT” is usually associated with the software used for criminal or malicious purposes.
A look at what the “threat landscape” is comprised of for businesses.
It’s not feasible to call a security solution, either for individual users or for businesses, “an antivirus.” There’s more than that.
Kaspersky Lab has rolled out a new cyberthreats report covering Q2. While it is consumer-oriented, certain findings are extremely relevant to business.
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Simda was a rather mysterious botnet that had been used for dissemination of third-party potentially unwanted and malicious software. It has a built-in tools to detect and evade emulation, virtual machines and security tools, effectively allowing the bot to stay out of grid – apparently for years.
A new, Chinese-language APT has emerged, seeking geopolitical information and targeting nations in and around the South China Sea
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
Over the last few years we have witnessed a number of high-profile, large scale security breaches with quite dramatic consequences, such as massive leaks of personally identifiable data.
Phishing used to be an exotic threat, but that was years ago when malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard – especially
Hardware is usually considered relatively safe and clean — as opposed to software which is usually the layer suffering from bugs and malware. But this is no longer true
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
2014 is over, as are the holidays. Time to look back at the business security highlights of past the year.
Kaspersky Lab has gathered stats on the cyberthreats in 2014. The figures are appalling, but they don’t spell out doom and gloom. It is all about awareness.