Our fan club is a teenager already!http://www.kaspersky.com
This year’s Kaspersky NEXT event showcased research and discussions from some of Europe’s most prominent experts in the field of cybersecurity and artificial intelligence. From machine learning and AI right through to securing the IoT, here are five things we learned about at this year’s event, which took place in Lisbon on October 14.Using AI to make the world more fair
Have you ever thought about how many decisions machines have made today? Or how many of those decisions were based on gender, race, or background? Chances are you don’t even realize just how many decisions are made by artificial intelligence instead of a human. Kriti Sharma,...
Hello Eugene :)
Kindly I need your help as I got a ransomware virus infected my laptop it's called BORA and I can't find any decryption tool all over the internet!
I was referred to nomoreransom.org but they don't have the tool available for the current time :(
After a two-week hiatus, Dave returns for the 114th installment of the Kaspersky Transatlantic Cable podcast.
We open the episode looking at the latest news on the Facebook front. Unlike most of our podcasts, the focus won’t be on privacy snafus. Instead, we will look at the latest news with Facebook’s Libra. Following up on that, we head across California to Google. In this week’s story, the focus is on the privacy surrounding smart speakers and whether owners should disclose their presence to guests in the house.
The third story has us jumping to a more global scale, where ATM jackpotting is once again in the spotlight. This time, it is Cutlet...
I’ve already mentioned a few times that we had a few American friends along for the rideadventure in the Far East, and that I’d be ‘getting to them’ later on. Well that later on has arrived!…
So who were these folks from the U. S. of A. (and a few other countries), who traveled with me and my regular expeditioners?
First up – Mr. Chris Burkard, the very famous and very successful photographer of all things extreme, distant, fantastic – often and preferably all three at the same time. He’d heard lots about the Kurils, and had long dreamed of exploring and snapping them. So one day, while...
Have you ever thought about what your answer would be if your precocious child asked, “What’s a politically motivated APT attack?” In fact, it’s straightforward. Just dust off your copy of Charles Perrault’s Puss in Boots and read it together with an eye on the cybersecurity aspects. After all, if we ignore the artistic liberties, such as a talking cat and ogres, the tale represents a marvelous example of a complex multivector APT attack against a (fictional) government. Let’s unpick this cybercrime together.
The tale opens with a miller posthumously leaving everything to his sons. The youngest son’s share of the inheritance includes the contact details of a...
Regular readers of my blog will know how I occasionally write about some of our less noticeable – but no less important – business successes: those related to our patents and how they help us fight – incredibly – not just cyber-evil, but also patent trolls who do nothing but hinder technological progress.
I said ‘success’. Well here’s out latest: we’ve become the first Russian company to enter the Derwent Top 100 Global Innovators! Hurray!
The Derwent Top-100 is a yearly rating conducted by the independent American company Clarivate Analytics of the most innovational companies in the world, based on companies’ patent...
In pursuit of business account credentials, cybercriminals are devising new ways to trick employees onto phishing sites. Previous spam campaigns have used SharePoint invitations and voice messages as bait.
Recently, our experts uncovered another phishing scheme in which cybercriminals try to mimic the performance appraisal process of the target company. The attack is twofold: Recipients think that the appraisal (a) is mandatory and (b) can lead to a pay raise. It’s worth noting that in some companies such appraisals are a routine part of the salary revision process and that’s why they don’t raise any suspicions.
It all begins,...
Back to the Kurils for the next installment on our far-eastern archipelago adventure…
Island: Simushir, uninhabited;
Location on island: Brouton Bay;
Place of interest: Abandoned Soviet naval base.
The naval base existed from the late-70s up until 1994. In its heyday around 3000 folks lived here. Now the place is deserted, has been looted, is overgrown and rusting. Up close: ugly. A way off, on a sunny day – mysteriously charming:
What the place is known most for among naval historians/buffs, and also the people who lived there and ‘participants’, is the story of its being the site of one of the...
For episode 113 of the Kaspersky Transatlantic Cable podcast, I fly solo because Dave is still on holiday. We will return to our regularly scheduled programing in next week’s edition.
To kick off the episode, I discuss the latest snafu from Twitter, where verification numbers and e-mails may have been added to the company’s Tailored Audience program.
Twitter is still short on details, but this is a story that’s definitely worth keeping an eye on.
The second story looks at the latest round of Governments vs. Facebook & Encryption. We talk about this topic quite a bit, but it is one that comes back over and over as governments try to find their...
Perhaps the first question that comes to mind for anyone who visits Baalbek is: who placed all these massive stones here, when, why, and how? Ok, ok: the first four questions ).
The stones are gigantic: almost too big to fit in a photo!
But you can’t really get a feel for their size if you see a pic just of them; you need to add a few Homo sapiens:
Here, the structure goes like this: smaller blocks at the base; above those larger ones; and above those – MASSIVE ones, with the following dimensions: 21 x 5 x 4 meters!
And those humungous blocks are seven meters above the ground. So who – or what – lifted them up? Wiki doesn’t...
Many businesses already utilize a cloud environment that consists of on-premises private cloud and public cloud resources — a hybrid cloud. However, when it comes to cybersecurity, companies tend to focus more on protection of physical or virtualized environments, paying much less attention to the part of their infrastructure that resides in public clouds. Some of them are sure that cloud providers should be responsible for the protection; some think that public clouds are secure by design, and so not requiring any additional protection. But both those hypothesis are erroneous: public clouds are as much prone to software vulnerability...
Ransomware has been and remains a big headache for both users and experts alike. It is not a simple task to recover files encrypted by ransomware, and in many cases it’s impossible. But we have good news for the victims of Yatron and FortuneCrypt malware: Kaspersky experts have developed and published decryptors for the files this particular malware encrypts.How to decrypt files encrypted by Yatron
Yatron ransomware is based on another encryptor, Hidden Tear, which has an unusual story. A few years ago, Turkish researcher Utku Sen created this malware for educational and research purposes and uploaded the source code to the...
We’ve answered this one a bunch lately, so we decided to address it in a post. When a user tries to download Kaspersky Free antivirus, they find that they have downloaded Kaspersky Security Cloud — Free instead. Here’s why.
Back in 2017, we introduced Kaspersky Free antivirus , a solution that offered basic protection for , so that no person would be left unprotected from cyberthreats. Under its hood thrummed the same engine as in our premium security products, which collect the majority of awards from independent test labs each year. And it really was free — no payment required, no third-party ads. And, no surprise, it became quite...
Lebanon: the photos – and a few videos – have been sifted, edited, spruced, and are ready. My tales from the country are ripe and also ready – to be blogged. But first – a photographic introduction: this post is made up of a few dozen pics of the country’s monumental historic places of interest.
While you view them, I recommend you update your knowledge of the geography and history of this part of the world; in particular of the following: Baalbek, Byblos, Phoenicia. There’s also the name Jeita Grotto, which may be new to you as it was for me (get ready to be astonished thereby). And, while you’re at it, you may as well refresh your memory of the modern history...
New technologies are clearly changing the world, but not the human psyche. As a result, evil geniuses are devising new technological innovations to target vulnerabilities in the human brain. One vivid example is the story of how scammers mimicked the voice of an international CEO to trick the head of a subsidiary into transferring money to shady accounts.What happened?
The details of the attack are unknown, but the Wall Street Journal, citing insurance firm Euler Hermes Group SA, describes the incident as follows:
October 4 has caught up with me again – suddenly, I’m 54 years old! Goodness!
It was as if leading Russian business daily Kommersant knew my b-day was coming up – including me in their 1000 Best Russian Managers – 2019 listing [Russian language]. Nice! Thank you: that was my first birthday present! Am much obliged.
Even nicer was seeing a full four K-bosses in the Top-100/Top-50 rankings in the same newspaper in their respective lines of work:
Dear, Eugene! Congratulations! We wish you a lot of amazing moments in your life, more innovative products and services in your business, be happy and full of love every second of each day!
Your Fan Club
Active since 2017, Smominru has now become one of the most rapidly spreading computer malware, according to a publicly available report. In 2019, during August alone, it infected 90,000 machines worldwide, with an infection rate of up to 4,700 сcomputers per day. China, Taiwan, Russia, Brazil, and the US have seen the most attacks, but that doesn’t mean other countries are out of its scope. For example, the largest network Smominru targeted was in Italy, with 65 hosts infected.How the Smominru botnet propagates
The criminals involved are not too particular about their targets, which range from universities to healthcare providers. However one...
You didn’t think there’d be just one post on Ushishir, did you! )…
Of course not! Why limit probably the best volcano in the world to just one? No reason at all; accordingly, here we go – deeper. Literally! Into a cave here! For example – the one ringed red, here:
From afar – nothing special ->
But then you get nearer…
Woah – hole! No – two holes: like eyes peering out. The devil’s eyes!
Birds everywhere – even inside this cave:
The seaweed stuck to the cliffs shows how high the morning full-tide gets.
We enter the cave. Looking back… “oh: nice!” – Petrovich.
And here are the two devil-eyes – ouch – from inside the...
For the 112th edition of the Kaspersky Transatlantic Cable podcast, I head to Moscow to discuss privacy with four of my corporate communications colleagues.
During the 20+ minute talk with Julia, Kate, Oksana and Anya, the discussion ranges from how and what we share online to what privacy is, what it is not and who should be regulating privacy on the Internet.
If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For more tips on privacy online, check out the blogposts on the topic below.
To budget for information security, companies need to consider factors such as average potential losses, preferably by incident type, as well as other businesses’ average outlays on security. Precise data on such questions do not get published, and that’s one reason we conduct an annual survey of employees who make business decisions related to IT security for a variety of companies. And now we are ready to share results of our 2019 survey.Financial implications
Compared with the results of last year’s survey, enterprise businesses’ losses have increased. Where previously an incident cost them an average of $1.23 million, now the average loss is...
The next stop on our Kuril-2019 adventure was the unparalleled Ushishir! One of the most beautiful locations in the Kurils; one of the most beautiful locations in the world. And If I were ever to compile a ‘Ten Most Beautiful Volcanoes in the World’ list (hmm – now there’s an idea!), Ushishir of course would be on it, and could even be at the top of it.
Actually, yes. Striking while the iron’s hot – let me quickly write up that list! I’ve seen all the world’s mega-volcanoes, so why not?
Recently, experts at AdaptiveMobile Security discovered a method of attack on mobile phones that can be carried out using a normal computer and a dirt-cheap USB modem. Whereas some older methods of cellular surveillance required special equipment and a telecom operating license, this attack, called Simjacker, takes advantage of a vulnerability found in SIM cards.It’s all about S@T Browser
Most SIM cards released since the early 2000s, including eSIM, feature a carrier menu. This menu includes tasks such as Balance Check, Recharge, Technical Support, and sometimes extras such as Weather, or even Horoscope, and so on. Old phones had it right in the main...
Every single island of the Kuril archipelago is volcanic. Each island came about due to volcanism; and most islands have one, two, three or more volcanoes on their territory, some being among the most beautifully symmetric (e.g., ideal pyramids) in the world. Many of the volcanoes are active – with lava-spewing eruptions occurring regularly. One such active island-volcano is Raikoke – an island with a real checkered (green and black – as you’ll see:) history – literally.
The name of the island comes from the Ainu language, and means ‘Hell Mouth’. Yep – I don’t think I could have thought of a better title:
Hell mouth has a serious bad...