Our fan club is a teenager already!
bhnRzclXS1KAqhrFVVLw5L5rHasxVq8r.jpg?w=270&s=5cc0ab8809b55f16d8a938b433c82de1Our fan club is a teenager already!Who are the fans of Kaspersky, and why is the fan club beneficial to the company as well as to the members of the fan club itself?http://www.kaspersky.com  

 

0
Uncle Sam compensates you for data leaks (yeah, right)

Uncle Sam compensates you for data leaks (yeah, right)

Data leaks of all sorts regularly crop up in the news, and recently so have fines, some potentially reaching into the billions, slapped on the companies responsible. If companies have to pay for data leaks, surely some of that money goes to the victims, right?

Surprise from the US Trading Commission

Recently, a curious site caught our eye. Seemingly owned by a certain Personal Data Protection Fund, the website’s main page states that the fund was created by the “US Trading Commission.”

At first glance, the site looks reasonably sound, with a restrained design showing a hefty sum on the right. A large banner at the top of the page...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 125

Transatlantic Cable podcast, episode 125

Welcome to the 125th edition of the Kaspersky Transatlantic Cable podcast.

Dave and I open the episode deep in the heart of Texas. In this story, a school system lost millions of dollars by transferring funds to cybercriminals after falling victim to a phishing campaign.

From there, we head further west, to Las Vegas, and its recent cyberincident. The third story takes us back to the topic of Facebook. Instead of our common discussion points, this story looks at encryption and where it stands with the Messenger platform. Spoiler: It’s not coming as fast as many would like.

To close out the podcast, we discuss two Windows-based stories. The first...

Read more...
About Kaspersky Lab
0
Can you trust digital signatures in PDF files?

Can you trust digital signatures in PDF files?

Hardly a company or government agency exists that does not use PDF files. And they often use digital signatures to ensure the authenticity of such documents. When you open a signed file in any PDF viewer, the program displays a flag indicating that the document is signed, and by whom, and gives you access to the signature validation menu.

So, a team of researchers from several German universities set out to test the robustness of PDF signatures. Vladislav Mladenov from Ruhr-Universität Bochum shared the team’s findings at the Chaos Communication Congress (36С3).

The researchers’ task was simple: Modify the contents of a signed PDF document...

Read more...
About Kaspersky Lab
0
The Faketoken Trojan sends out offensive texts

The Faketoken Trojan sends out offensive texts

The inventiveness of virus makers knows no bounds. Some ransomware apps now have mining capabilities, and some banking trojans extort their victims. Faketoken may have a goofy name, but this banking Trojan for Android devices is serious business.

Faketoken: From SMS thief to full-fledged banker

The banking Trojan Faketoken has been around for quite a while — back in 2014, it made our top 20 list of the most widespread mobile threats. Back then, the malware operated in concert with desktop banking Trojans. The desktop app hacked victims’ accounts and withdrew money, and Faketoken intercepted text messages with one-time passwords to confirm...

Read more...
About Kaspersky Lab
0
Four theories for better learning

Four theories for better learning

If you have ever handled the task of teaching staff information security basics, you know how tricky it can be. Those out of touch with IT tend to have trouble registering new information on the subject, and they’re also quick to forget it. They also don’t always see the point of drills. All in all, training isn’t always effective.

Effective training and retention are critical links in the corporate cybersecurity chain. As in other fields of education, the psychology of memory — known patterns of memorization and information reproduction — becomes useful in cybersecurity training. Here are four useful tricks that can enhance the retention of learned...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 124

Transatlantic Cable podcast, episode 124

After a few weeks’ hiatus, Dave and I return for the 124th edition of the Kaspersky Transatlantic Cable podcast. We hope you had great holidays.

To kick off the episode, we circle back to one of the topics that we closed out 2019 with: Amazon’s Ring. Earlier this week, the company announced a new and improved privacy dashboard. It has some critics.

From Amazon, we move to Arkansas, where ransomware played Grinch for a few hundred call center workers. The company was hit with ransomware, but even though it paid the ransom, it could not restore the data, which shuttered the company. We stay on the topic of ransomware for our next story. Travelex, a...

Read more...
About Kaspersky Lab
0
Open source is not a cure-all

Open source is not a cure-all

With many believing open-source software is more secure than proprietary software, we are now also seeing attempts to apply a similar theory to hardware development. At the 36th Chaos Communication Congress (36C3) hackers’ conference last month, however, experts Andrew “bunnie” Huang, Sean “xobs” Cross, and Tom Marble raised doubts about whether employing open-source development is enough to solve trust problems in hardware. Huang spoke at length on the topic.

Differences between hardware and software in terms of trust

Open-source software’s safety lies not only in its openness, but also in widely used tools that help ensure the program you run at the...

Read more...
About Kaspersky Lab
0
The connected product life cycle dilemma

The connected product life cycle dilemma

How long should a product’s life cycle be? Of course, that depends a lot on the product: People keep their cars for years or even decades, whereas a toothbrush usually lasts only a couple of months.

Now let’s add another dimension: How long should a connected product’s life cycle be? With more and more products being connected nowadays, getting to that answer is significantly less obvious and more complicated. Professor Ross Anderson of Cambridge University touched on the topic in his talk at 36C3 (the 36th Chaos Communication Congress), and we wanted to consider it in a little more detail.

The life cycle of a connected product

Products without...

Read more...
About Kaspersky Lab
0
The aftermath of the Twitter epilepsy attack

The aftermath of the Twitter epilepsy attack

November was National Epilepsy Awareness Month in the United States. Last November indeed saw a greater awareness of epilepsy, but most likely because of a scandalous attack: Internet trolls on Twitter used flashing animated images, and tagged the Epilepsy Foundation, to harm people by causing epileptic seizures.

How the attack worked

Epilepsy, a neurological disorder, is characterized by recurrent epileptic seizures. Every year more than 100,000 people die because of epilepsy. One of its common variants is photosensitive epilepsy, in which seizures can be triggered by flickering lights, and the attack targeted people with this form of...

Read more...
About Kaspersky Lab
0
A port with the fragrant smell of incense.

A port with the fragrant smell of incense.

As part of my plans I have a brief one-and-a-half-day stopover in Hong Kong. If memory serves me correctly, the Chinese name of the city 香港 means “fragrant port”. It’s always useful to check these things though… Well, I was almost right – it’s closer to “incense harbor”. The meaning of these hieroglyphs were once explained to me a long time ago by a Chinese man who wasn’t that fluent in English :)

“Incense harbor”. What a beautiful name! For some reason, I got to singing the golden oldie by Vertinsky: “Your fingers smell of incense, and sorrow sleeps in your eyelashes…”.

nrMTWFyeMZwTIvt15mCYuXK10mo97eOD.jpg?s=b460aca783be25166e345ddec1aebaf9

A beautiful city! … I’m not here to discuss prices and the quality of...

Read more...
On The Road Again
0
Eugene...
How can I decrypt file infected by ransomeware (.Gusau) ??  help me please..
Ask Eugene Kaspersky
1
harlan4096: Welcome, try these links to identify and search a possible decryptor: https://id-ransomware.malwarehunterteam.com/index.php?lang=en_US https://noranso...
Snow White, the Seven Cryptominers, and the targeted attacks

Snow White, the Seven Cryptominers, and the targeted attacks

Children know how to ask uncomfortable questions. Does Santa Claus exist? Where does the tooth fairy take the teeth it collects? Is it even possible to track any person you want to? Is it true that governments are often behind targeted attacks?

Fortunately, answers to the last two questions can be found in Snow White and the Seven Dwarfs, which describes a number of interesting technologies (in allegorical form, of course). Once you know where to look, everything falls into place. Let’s investigate the subtext of the famous Grimm Brothers fairy tale.

Mirror, mirror on the wall

The tale begins with a king who is widowed at the...

Read more...
About Kaspersky Lab
0
Hanoi by night.

Hanoi by night.

My lightning business trip is coming to an end. It started with the Moscow-Delhi route, but now I’m sat on my suitcase again and am about to fly more or less back the way I came. It all worked out well, almost like the last time I spent three weeks to a month travelling around the world :) But there’s no need for such heroism now. All the lands have been cultivated (except Antarctica, Atlantis, the Moon and Mars); the right people are tending them, weeding and watering them, pests are kept away and the crops are harvested. In some places several times a year :) And by doing so, they are saving everyone from global cyberthreats. But I still have to travel back and forth to...

Read more...
On The Road Again
0
The daily life and sights of Delhi.

The daily life and sights of Delhi.

Delhi. This is the third time I’ve been here, and finally I decided to do some tourism. On the previous occasions, I’ve had to do press conferences, meetings and was always on the go. I did make it to the Taj Mahal once. But if we’re being honest, there are two things that get in the way of proper tourism here: the polluted air (see below for more), and the chaotic traffic. You step out of your hotel, leaving behind the cleansed, air-conditioned environment, and you are met with the smoke of the local neighborhood.

At the beginning of the week, when we had two days in Delhi according to our approved travel plan, a third obstacle made itself felt to...

Read more...
On The Road Again
0
Mathematics – the queen of sciences.

Mathematics – the queen of sciences.

Hi all!

There will be two topics today: 1) where to go to study; and 2) a brain teaser – how can you obtain all the numbers from 0 to 100 using the digits 1, 4, 0, and 9. Let’s start with number one.

1) I often get asked: “What sort of education should my kid get? Which subjects are likely to be in demand in the future?”

I do not pretend to be an all-knowing visionary, but I have absolutely no doubt about the answer to this one: teach your kids mathematics! It’s the most fundamental, most indispensable and the greatest of all the sciences. Learning it opens the door to lots of different and wonderful professions. Good mathematicians can then become...

Read more...
On The Road Again
0
Biometrics. Lord of the ring!

Biometrics. Lord of the ring!

It’s now perfectly normal to unlock your phone or computer with a fingerprint – nobody would bat an eyelid. In fact, more and more biometric data is being collected, whether it be facial, voice or iris recognition. This type of authentication appears to be very reliable because every human’s physical and behavioral features are unique. However, very few think of where all that data is stored and how it’s protected. What if somebody gains access to it?

rpNRsASgpfsE9VBTGA8p23Hdz8kuJv4T.jpg?s=0cdca176f7c68d8d1013a36ffb296596

According to our experts, in Q3 2019 alone, 37% of computers used to store and process biometric data faced the risk of a malware infection at least once. Of these, more than 5% were infected with spyware. The...

Read more...
On The Road Again
0
Reaping the fruits.

Reaping the fruits.

The year is coming to a close, and it’s only natural to sum up the various results of the last 12 months. So here’s a triple whammy of good news:

1) Our business security solution won the Gartner Peer Insights Customers’ Choice in the Endpoint Security Solutions category for the third consecutive year. This year, it scored 4.6 points out of five, based on 1,747 reviews from real users. Gartner Peer Insights is an independent platform where corporate customers can leave positive or negative feedback on the products they use and give them scores. Customer’s Choice is ranked based on the scores vendors receive from users, taking into account both the quality and quantity...

Read more...
On The Road Again
0
The Panthéon, the Pendulum, and Paris.

The Panthéon, the Pendulum, and Paris.

I’ve been to Paris so many times on business, and always manage to squeeze in a little bit of tourism, even if it means doing the same thing for the umpteenth time. After the 15th anniversary of our French office, I had a few hours to spare before the next leg of my business itinerary, so I went to Panthéon of Paris!

Here, amongst many other things, you can see the Foucault pendulum with your own eyes. It was first put on public display for curious tourists and other citizenry… apparently back in 1851. There it is – that dangling thing:

cZohgYinhbT1EJG-lBzWeRoBc-1XSqdE.jpg?s=abfc450d9347fead36c3c0a714cc0b4f

It’s moving, see!

Of course, this in no way contradicts the theory of a flat Earth. Rather, it just demonstrates...

Read more...
On The Road Again
0
Hi, My PC was attacked by a Ransomware virus that encrypted our entire computer and it's backup external HDD which was attached via USB.  The files all have *.righ extension. Any suggestions or help in finding the right tool would be greatly appreciated.

Thank you
​Ilaya
Product support
3
harlan4096: For some variants of this kind of malware there is no solution, or at least not currently, since the files were encrypted with a high private key (pro...
K FR = 15!

K FR = 15!

The celebrations to mark the 15th anniversary of our French office in Paris were lots of fun! But we start this story with a picture of the birthday cake from the 10th anniversary of our French office:

T8tBIcCRC2KCJo9IJihWOBeygxpSpC7_.jpg?s=e5c54ef5607f4aa0cf0d6dfbb377d2d3

Why? To jog the memory – by going through my archives and photos I recalled all sorts of various stories. Like this hilarious one, which is probably hard to believe now. This is what happened.

It was back in the days when online banking was just getting started and serious cybercrime was only beginning to raise its ugly head; when people still had push-button Nokias and Sony Ericssons in their pockets and plane tickets were printed on paper (long sheets stitched together). It...

Read more...
On The Road Again
0
Venice vs. November, floods and a biennale.

Venice vs. November, floods and a biennale.

What’s that whooshing sound? Ah, it’s me rushing from Cancún to Venice, to attend a business event the next day :)

J0Jj0KNZn2nLSku6UmGv7bpxx-FjH7_h.jpg?s=720ab96cabbf6c7cd483c2995828bad8

I got to thinking about my previous visits to Venice and how I usually arrived by car. In fact, I hadn’t flown into Venice airport for about 15 years! This time, they told me I shouldn’t be too surprised about their unusual new arrivals terminal. And it really was unusual – or, at least the parking lot:

That’s right! You can take a boat from Venice airport (which is on the mainland) straight to the islands on which Venice lies.

Here’s my suitcase next to the taxi:

This is a shot of the “car park”:

I’ve only ever experienced...

Read more...
On The Road Again
0
GUSD smart contract allows for theft of antispam payments

GUSD smart contract allows for theft of antispam payments

The Winklevoss twins are best known as the alleged founding fathers of Facebook — and even received $65 million in compensation from Mark Zuckerberg in 2008. In 2013 they invested heavily in Bitcoin, buying about 1% of all existing coins at $120 apiece.

Soon after, the brothers opened the Gemini cryptocurrency exchange, and in 2018 they launched the stablecoin Gemini dollar (GUSD). A stablecoin is a fixed-rate cryptocurrency — 1 GUSD token always costs 1 US dollar. Stablecoins are handy for “digitizing” real dollars. They make moving blockchain dollars between exchanges quick and easy. The guarantor of the reverse conversion to...

Read more...
About Kaspersky Lab
0
Diez cenotes, o, cenotes sobredosis!

Diez cenotes, o, cenotes sobredosis!

Ingredients: the Yucatan peninsula; three free days between business events; a great desire to check out cenotes and bathe in them.

Something to be factored in: No Rio Secreto this time; been there a few times, done that, swum that – without the t-shirt.

Decision: Uno, dos, tres – let’s check out 10 cenotes!

There are four types of Cenotes: Cantaro (a cave with a hole in the roof thereof); cilindricos (with strictly vertical walls); aguagas (with shallow water basins); and grutas (cave cenotes, with a horizontal entrance with dry sections). Now, for some reason, along the coast of Yucatan there are mostly the latter to be found – grutas, while if you...

Read more...
On The Road Again
0
Mayan pyramid duel – Chichen Itza vs. Coba.

Mayan pyramid duel – Chichen Itza vs. Coba.

Ancient Mayan sites are scattered over rather a wide territory, covering parts of what are today Mexico, Guatemala, Belize and Honduras. But if you want things narrowed down to just former cities with pyramids, the internet obliges – in competing ways; for example:

10 Most Beautiful Ancient Mayan Temples
13 Most Beautiful Ancient Mayan Temples

On our three-day car-based excursion around Yucatan, besides Coba, we also made a visit to the famous Chichen Itza, including its centerpiece, El Castillo, aka the Temple of Kukulcan. Have a read of what that link takes you to – especially about the steps and the platform (=365), and about the ‘snake’...

Read more...
On The Road Again
0
The cybersecurity of Star Wars: The Rise of Skywalker

The cybersecurity of Star Wars: The Rise of Skywalker

The long-awaited Star Wars: The Rise of Skywalker has finally hit the big screen. Not everyone has seen it yet, so we will not give away any spoilers or discuss the Death Star–size holes in the plot, or even the film’s artistic merits and demerits. We are interested in Episode IX solely from the standpoint of information security. So this post will cover cybersecurity-related moments in the movie, and see how well (or otherwise) the characters acted.

Data transfer from ship to ship

In the Star Wars universe, data transfer is a bit of a muddle. Some information can be transmitted quickly across vast distances, other types only on...

Read more...
About Kaspersky Lab
0