Information security digest, 18.09-18.10
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
1094 articles
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
This week Kaspersky Lab announced a strategic partnership with Vertu, the manufacturer of luxury mobile phones. Thanks to the agreement between the two companies, all users of Android-based Vertu smartphones
Kurt Baumgartner, targeted attack expert and the principle security researcher at Kaspersky Lab, sat on a panel discussing how the global market for trafficking financial information has changed, how it
In this short podcast Kurt Baumgartner, Kaspersky Lab Principal Security Researcher, shares his views on what current corporate IT security threats are, why it is important to install patches, and
The BYOD concept almost immediately became a source of problems for system administrators who also have relatively recently had to deal with mobile malware of an uncontrollable growing number and
The question of ordinary users’ awareness of cyber threats and the scope of their knowledge about them may seem philosophical or rhetorical, but only at first glance. The results of
The solution contains a number of functions with similar names that can be somewhat confusing. In this case we are talking about Mobile Device Protection (part of Mobile Device Management)
On the web you can find regular discussions about how people used to live without mobile phones. Somehow people lived without them until quite recently, but now it seems unimaginable.
Very small businesses, including private enterprises and companies with fewer than 25 people involved, are the foundation of the economic structure of the developed and of many developing countries without
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
They don’t live under a bridge, but they are quite ugly. Patent trolls have been lurking around Kaspersky Lab for years, trying to make a claim that we are using
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
When a new high-profile attack is revealed–whether it’s a technology company, a government agency or a financial institution that’s targeted–the attention often focuses on the victim and what the attackers
Recently, I had the chance to visit a number of industrial events and could see the evolution of cybersecurity in the industrial field. One of these was the 4th National
Passwords are the main method of authentication for the Internet today. They were yesterday, the day before yesterday, and will probably be that way in the near future too. Accordingly,
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
Although we usually talk about the ways to protect information from threats, today we are going to list several proven and popular ways to lose data and, possibly, even money.
Black Tuesday August the 13th brought numerous challenges to (primarily) corporate users of Microsoft products. The company released patches for critical vulnerabilities in Windows, Exchange Server and Active Directories. As
88% of tablet users and 96% of smartphone owners use personal devices to store important personal information. These figures are from the survey B2B International and Kaspersky Lab cooperatively conducted
The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn’t cause any catastrophic consequences for the users, they