Modern OSs for embedded systems

by Alexander Shadrin
20 Jun 2018 at 10:00am
At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other words, the internet of things). Our primary interest is how and to what degree these OSs can solve cybersecurity-re...

Olympic Destroyer is still alive

by GReAT
19 Jun 2018 at 10:00am
In May-June 2018 we discovered new spear-phishing documents that closely resembled weaponized documents used by Olympic Destroyer in the past. This and other TTPs led us to believe that we were looking at the same actor again. However, this time the attacker has new targets.

LuckyMouse hits national data center to organize country-level waterholing ca...

by Denis Legezo
13 Jun 2018 at 10:00am
In March 2018 we detected an ongoing campaign targeting a national data center in the Central Asia that we believe has been active since autumn 2017. The choice of target made this campaign especially significant ? it meant the attackers gained access to a wide range of government resources at on...

A MitM extension for Chrome

by Vyacheslav Bogdanov
6 Jun 2018 at 10:00am
Browser extensions make our lives easier: they hide obtrusive advertising, translate text, help us choose in online stores, etc. There are also less desirable extensions, including those that bombard us with advertising or collect information about our activities. These pale into insignificance, ...

FIFA public Wi-Fi guide: which host cities have the most secure networks?

by Denis Legezo
4 Jun 2018 at 11:11am
We all know how easy it is for users to connect to open Wi-Fi networks in public places. A lack of essential traffic encryption for Wi-Fi networks where official and global activities are taking place ? such as at locations around the forthcoming FIFA World Cup 2018 ? offers especially fertile gr...


by Anna Larkina
1 Jun 2018 at 9:00am
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital...

Trojan watch

by Sergey Lurye
29 May 2018 at 10:00am
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smar...

2018 Fraud World Cup

by Maria Vergelis
28 May 2018 at 10:00am
There are only two weeks to go before the start of the massive soccer event ? FIFA World Cup. This championship has already attracted the attention of millions worldwide, including a fair few cybercriminals. Long before kick-off, email accounts began bulging with soccer-related spam, and scammers...

VPNFilter EXIF to C2 mechanism analysed

by GReAT
24 May 2018 at 6:00pm
Our colleagues from Cisco Talos published their excellent analysis of VPNFilter, an IoT / router malware which exhibits some worrying characteristics. We?ve decided to look a bit into the C&C mechanism for the persistent malware payload.

Spam and phishing in Q1 2018

by Nadezhda Demidova
23 May 2018 at 10:00am
The quarter's main topic, one that we will likely return to many times this year, is personal data. It remains one of the most sought-after wares in the world of information technology for app and service developers, owners of various agencies, and, of course, cybercriminals. Unfortunately, many ...

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites