![](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2017/05/06020130/wide2-700x420.png)
Where have all those malware epidemics gone?
It’s been years since we’ve last heard of any large worm epidemics. Does it really mean that malware epidemics have gone away for good?
1249 articles
It’s been years since we’ve last heard of any large worm epidemics. Does it really mean that malware epidemics have gone away for good?
Kaspersky Lab’s recent survey surprisingly found that e-commerce, online retailers and financial service providers are not just the biggest sources of stolen financial data, but also feel just a bit too lax about security. However, this has some severe implications.
Having your business bank account hijacked by cybercriminals could bankrupt your company, but that type of breach isn’t really what law enforcement cares about. They are concerned with only one thing: how well you protect certain information.
A curious story about a cyber-investigation of fraudulent activities, which our GERT group had recently conducted on behalf of one of the company’s clients. The attackers were quite thoughtful, but not good enough.
A large number of logins and passwords to accounts in several free email services – Mail.ru, Yandex and Gmail.com – had been leaked. Once again, passwords prove to provide insufficient protection. What does it mean for businesses?
The biggest concern about Apple Pay is that one’s iCloud account now controls not only private photos, app data, and messages, but also money. You lose your password – you lose everything and as the celebrity hack showed us, there is no need to hack Apple’s servers. Social engineering, phishing, trojans – all cybercriminal tools will now be targeted at people’s electronic wallets.
There have long been rumors in the InfoSec community that in the wake of recent revelations, foreign institutions embraced old-school means of keeping their secrets safe. Namely, once again embracing the typewriter. This is actually like betting on horse carriages at the dawn of the auto industry – sort of denying the future.
IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
A while ago we “celebrated” 10 years since the first smartphone malware emerged. While we made the first Symbian antivirus in 2004, it doesn’t mean that we had no mobile security products before that. It was hard to unearth and boot an antique handheld from early 2000s, and even harder to find, install and launch our old software. Yes, it’s long obsolete, but there’s a reason for all these efforts. Read about it in our new blog post.
Small businesses are unwilling to invest in security solutions – often because they don’t think there are any – designed specifically for their needs. But such solutions do exist.
Kaspersky Endpoint Security proved to be an undisputed champion in Dennis Technology Labs’ testing in Q2, 2014.
Kaspersky Lab launches Beta Testing of a new version of its enterprise security solution. Service Pack 1 for Kaspersky Endpoint Security 10 for Windows (the software for endpoints) and Kaspersky
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
The latest survey by Kaspersky Lab and B2B International shows a clear demand by users for extra security from banks and payment services.
Can we beat software vulnerabilities? It is not possible to do so completely, but there are ways to mend the issue.
We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.
Windows XP’s longevity is fascinating – and terrifying from the security point of view. The latest survey shows it’s still around – over 16% of KSN users still use Windows XP, but it is also clear that its epoch is near the end.
A recent survey shows that IT professionals have a very uneven understanding of how to protect their virtualization environments. Baseline awareness exists, but there’s a Roman Colosseum of room for improvement.
High-tech crime sounds impressive, but actually the tools are the only somewhat high-tech part, the goals almost never are.