Critters evolving: Trojans on the rise in Q2
Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
Musician and technology enthusiast.
355 articles
Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
A visual representation of a problem appears just a bit more meaningful, and at the same time more comprehensible, than large sheets of texts. Here is a big (or not so big) picture of threats to medium-sized businesses.
Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
As a security vendor, we at Kaspersky Lab have to foresee possible problems stemming from essentially good things. Serious transformations in the software market bring both new advantages, but also new problems and challenges, to which we need to pay attention.
The same code base of Windows for various devices means also that the same malware can hypothetically attack all of them.
Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
It’s like spammers aren’t even trying anymore. Still, be on the lookout for some of these typical tricks.
Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
We hear a lot about so-called MITM attacks, but what is it in a nutshell? Let’s look at the “layman” explanation.
Miniduke APT campaign is reactivated. The malware received a number of updates, and a large part of it is apparently intended to throw off researchers. Not exactly a successful endeavor.
Microsoft hit hard at No-IP.com, a dynamic DNS service which was in active use by cybercriminals. However, the “collateral damage” toll appeared to be a little too high.
New Kaspersky Lab’s survey shows VSB owners are well aware of IT threats, but their priorities lie elsewhere and the “immunity by obscurity” approach is a bit too common.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.