
Talk Security: ShellShock Bash Vulnerability Dominates September
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
234 articles
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
First ever SMS Android Trojan in U.S., update on OpenSSL Heartbleed, Apple fixes SSL vulnerability in iOS and OSX, AOL Hacked, and Iowa State Bitcoin Mining.
The first quarter of 2014 has passed, so Kaspersky Lab’s researchers have released their quarterly report on IT threat evolution for the first three months of 2014. It’s quite an
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive
Learn the ins and outs of TOR and what kind of sites this technology makes available in your system.
Game of Expectations Kaspersky Lab’s experts detected phishing newsletters that were supposedly advertising the messenger service, WhatsApp, being released for PC. WhatsApp is an extremely popular messenger for mobile platforms,
Another month has passed with exciting security news and helpful tips to manage your online safety provided by Kaspersky Lab. We’ve rounded up the best posts from January in case
The year has just begun, but law enforcement agencies around the world have already caught a number of major cybercriminals. As in the past, we continue to closely monitor the
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
The Christmas and New Year holidays, alas, were not a pretext for any real decrease in the number of information security incidents, as experts and users continue to face malware
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
In December 2013 information security incidents proliferated, unfortunately. Even if the number of incidents remained within the average values, their significance, alas, was not moderate. The interests of millions of
2013 will be remembered by both security professionals and everyday people for the number of events that took place in information security. Various incidences, from Edward Snowden’s revelations to the
We’re officially into the month of December, which means another month of posts has passed. If you missed anything from November, not to worry, we’ve rounded up some highlights to
DDoS attack without head… A powerful and very unusual DDoS attack was discovered in mid-October. The attack was unusual in that it employed a version of the Phantom JS headless
Ransomware in general is not exactly the nastiest malware out there, but a new variant – called CryptoLocker – is particularly worrisome because it actually does what most ransomware merely
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals