17 News Story Topics
Remove Filter
|
|
It's all too easy to think that spam is an old problem, and one that has largely been dealt with. Certainly, many people will tell you that they see very little evidence of spam in their mailboxes. This, however, has less to do with the demise of the spammer and … |
|
According to a [SecureList posting](https://securelist.com/blog/69462/darwin-nuke/) dated April 10th, researchers Anton Ivanov, Andrey Khudyakov, Maxim Zhuravlev and Andrey Rubin discovered a vulnerability in the Darwin kernel back in December 2014. Why is this of interest? Well, the Darwin kernel is an open source part of both the Apple operating systems. The … |
|
Ever wondered why the bad guys continue throwing malware in your direction? The obvious answer is the correct one: because they make money from doing it. On Thanksgiving Day, as all others across the year it would seem, they can be thankful for the high profit to be raked in … |
|
The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for … |
|
Your web browser provides a window onto the Internet, but unless you are timely in updating the client you use then, say researchers with security vendor Kaspersky Lab,that window may be cracked and allow a draft of insecurity to blow through into your network, your computer and your data. ![firefoxversions](/attachments/small/0/firefoxversions.jpg … |
|
Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at [Kaspersky Lab](http://www.kaspersky.co.uk/) who have been following the progress of … |
|
The news that, following a number of pretty high-profile password compromise cases, Twitter is adopting a two-factor authentication for account access is to be welcomed. 2FA, as it is known, applies the better security concept of something you know combined with something you own into the access equation. The thing … |
|
Continuing our round up of 2013 IT security vendor predictions, we've got the thoughts of three of the big Infosecurity Europe exhibitors: Palo Alto Networks, SafeNet and Kaspersky Lab. ![dweb-infoseceurope](/attachments/small/0/dweb-infoseceurope.jpg "align-right") Brian Tokuyoshi from Palo Alto Networks predicts that social media, data decryption and virtualised network security will be high … |
|
Eugene Kaspersky will today be inducted into the Infosecurity Europe 2010 Hall of Fame in recognition of his contribution to the advancement of the IT security industry during more than twenty years in the business. It's not the only award he has received, as the SC Awards Europe 2010 also … |
|
It all kicked off last night with a [URL="http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/"]posting to hacker board[/URL] claiming to have carried out a relatively simple SQL Injection attack on one the world's biggest and best known IT security companies: Kaspersky. The hacker, currently only know as 'unu' claims that the SQL Injection attack on usa.kaspersky.com … |
|
Yesterday [URL="http://www.daniweb.com/blogs/entry3943.html"]I reported[/URL] how the security vendor Kaspersky had allegedly fallen victim to a SQL Injection attack, with the usa.kaspersky.com website hacked and plenty of data potentially exposed. I said that Kaspersky would no doubt make an official statement sooner rather than later, and it has. Unfortunately it is one … |
|
Kaspersky Lab has successfully [URL="http://www.itpro.co.uk/blogs/daveyw/2009/02/23/kaspersky-patents-malware-removal/"]patented yet another bit[/URL] of security technology. This time it is a new heuristic analysis technology which allows security ratings to be assigned to software based entirely upon behaviour patterns during emulation. Is this something to get excited about? Well, yes, if you look beyond the … |
|
Today is [URL="http://www.saferinternet.org"]Safer Internet Day[/URL] 2009, apparently. Every year since 2004, one day in February has been designated as Safer Internet Day in order to promote a safer and more responsible use of online technology and mobile phones. It is aimed primarily at children and young people across the world. … |
|
I was privileged to attend the 5th [URL="http://www.kaspersky.com/"]Kaspersky[/URL] Lab forum, held in the city of London, yesterday. It was actually a Cybercrime Forum (I have no idea if the other forums were as well, as this was my first), and so the main focus was – yeah, you guessed it … |
|
Rather surprisingly, Kaspersky Lab has forecast that the security threat landscape will increase by more than 20 million programs by the end of 2008 when compared to the 2007 year-end figures, a ten-fold increase no less. That is worth repeating: the number of [B]new[/B] malicious applications in circulation by the … |
|
Kaspersky Lab has [URL="http://www.viruslist.com/en/analysis?pubid=204791980"]published its list[/URL] of the most prevalent viruses for the end of 2007, and although an email worm retains the top spot the more interesting stuff is happening immediately below it in the rankings of shame. Specifically, the second, fourth and seventh places which are all occupied … |
|
[URL="http://www.kaspersky.com/"]Kaspersky Lab[/URL] has released its latest Malware Evolution [URL="http://www.viruslist.com/en/analysis?pubid=204791907"]report[/URL], covering the period between June and September 2006 and, as usual, it makes for interesting reading. Alexander Gostev, Senior Virus Analyst, Kaspersky Lab comments that the first six months of 2006 was “notable for the complexity of the technologies which antivirus … |
The End.