Bugs and Scams and WhatsApp Web
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
448 articles
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
There are various ways to assess the threat landscape, but it’s what companies think of it that is most important. We decided to pick the top 10 events of 2014 by a single criterion: the popularity of the corresponding stories. And here is what we came up with.
A third-party plugin for WordPress CMS – RevSlider – made vulnerable up to 100K WordPress-based sites, with more than 10K blocked by Google for re-distributing malware they fell victims prior
Ransomware is a common and much-feared problem. Here are ten facts to help in dealing with it.
Kaspersky Lab has gathered stats on the cyberthreats in 2014. The figures are appalling, but they don’t spell out doom and gloom. It is all about awareness.
Electronic devices becoming so smart that they take over mankind is a recurring theme in sci-fi. Chronophobia and futurophobia are widespread, too. But what’s the point of being afraid? Security in the coming age of Smarternet requires awareness and attention.
Cybercrime is a rather lucrative business. Cybercriminals are earning a lot, or at least their effort-to-profit rate is good enough for them to keep going. But how good is it?
Can a business be “partially” prepared to ward off cyberthreats? That’s up for debate, but it seems there is little difference between “partial protection” and no protection at all.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
This post is comprised of two topics: a Trojan Opfake.a, which made a lot of buzz earlier this months and analyzing mobile malware at home. The latter is quite possible, but requires protective measures.
Malvertising is an ambiguous term referring to malicious online advertisements; some cause malware infection while others track user behavior.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
Kaspersky Lab has released a new IT Security Risks Survey, conducted in 2013-2014 together with B2B International. Facts and figures show that security situations in businesses improved very little, if at all. Small and mid-sized businesses still have their IT strategy low on their priorities list.
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
Kaspersky Lab’s Intrusion Detection Systems now detects RDP brutforce attack attempts, and the statistics gathered since early June looks quite displeasing.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.