About Kaspersky Lab
Interesting news, information and useful information about KL products
Members
1450
Category
Entertainment
Why machine learning is not enough

Why machine learning is not enough

Connected technologies are invading our lives more and more fully with each passing day. We may not even notice how natural it’s become to ask Siri or Alexa or Google to interpret more of our human experience, and expect our cars to respond to the rules of the road fast enough to keep our hides intact. Some of us are still bothered by technologies such as public cameras feeding images to facial recognition software, but plenty aren’t.

9VhCZr3G8GHJyX409kubhIxsccWgY8Hh.jpg?s=9a0486a2341fec62d1bdce0bc04e81de

At this point, it’s easy to laugh at a lot of AI failures because on balance they’re mostly funny (just forget about the potential for fatal outcomes). Well, we think as the machines march on, and as malware...

Read more...
About Kaspersky Lab
0
Trojans exploit WAP subscriptions to steal money

Trojans exploit WAP subscriptions to steal money

Do you remember what WAP is? Didn’t think so! WAP is a rather primitive excuse for mobile Internet. The tiny websites it can access show mostly text, and we visited them back when phones had just learned to transmit data.

Despite the fact that WAP has practically passed into oblivion, parts of the technology are still supported by mobile carriers. For example, some still support WAP billing, which allows users to pay for something right on a website directly from their mobile accounts.L0-TUd5-gmKvAwBV7HuyMCrvKZWT3zWd.jpg?s=cd2c7add68bec7ab7d403efd4c205da3

WAP billing as a revenue source for cybercriminals

WAP billing has several problems. First of all, it is not quite transparent for the buyer. In theory, a...

Read more...
About Kaspersky Lab
0
Transforming business – from selling solutions to enterprise partnership

Transforming business – from selling solutions to enterprise partnership

Every company that reaches a certain threshold has to face the challenge of transformation. That threshold might be reaching a certain revenue — for example, surpassing eight figures. At this point, technology companies have two ways to go.pdx1GxuTI2Za5txJfXcS6iCmTfXip7sg.jpg?s=3c8ae5b0d28aaab6ef25df3b8181f1a1

The first is to drive average revenue per user upward. When you have reached a customer-base plateau, attracting more customers becomes too costly, so it makes sense to offer more value to existing customers through additional features, options, and so forth. Doing so requires having a good feedback channel; without hearing from your customers it’s impossible to understand...

Read more...
About Kaspersky Lab
0
Technologically advanced phone scams

Technologically advanced phone scams

Readers of this blog will already be familiar with phone scams — you’ve probably even received a shady call or two. But you don’t accept offers from strangers or give up personal info when speaking to them, so you’ll be fine, right?

It turns out that the answer is no, not really. Not long ago, the Federal Communications Commission (FCC) issued a warning about an unusual phone scam. Fraudsters call their victims up and ask a seemingly innocent question: “Can you hear me?” The answer “Yes” is all they need. Replaying a recorded affirmative response lets them subscribe their victims to paid services, which will be included in the...

Read more...
About Kaspersky Lab
0
Caring for healthcare

Caring for healthcare

Since the first Geneva Convention was signed, medical workers have been granted special status and hospitals have been recognized as neutral territory. In the future, we will probably need some kind of online counterpart; healthcare companies suffer from cyberattacks no less than other targets do. The big difference is that in the case of public health companies, what’s at stake is not only business, but also human health.

However, even if such a convention comes into force, it will not rid medical companies of the necessity of providing full-fledged protection against cyberthreats. Quite often, malefactors launch “mass destruction” attacks, and as much as...

Read more...
About Kaspersky Lab
0
Not-a-Virus: What is it?

Not-a-Virus: What is it?

Sometimes, Kaspersky Internet Security pops up a window with a yellow frame and informs the user that “not-a-virus” has been detected on the computer. Of course, any curious user would wonder why, if something is not a virus, an antivirus application would inform them about it.

Actually, your antivirus has reason for concern. Although the object in question is indeed not a malicious program, it’s something you should know about anyhow. Let us delve into the definition of “not-a-virus,” what kind of applications trigger the warning, and what should you do about those applications.5xie2RUusY9mE_Yzw7d4xnXuvH8yEzMm.jpg?s=db4a0d8be51dab63b6c3c0af55fec7fc

Generally speaking, Kaspersky Internet Security associates...

Read more...
About Kaspersky Lab
1
PSN: https://play.google.com/store/apps/details?id=com.ekathvatech.onlinemp3download
Six myths about blockchain and Bitcoin: Debunking the effectiveness of the technology

Six myths about blockchain and Bitcoin: Debunking the effectiveness of the technology

Blockchain: so cool, what a breakthrough — soon almost everything will be based on blockchain technology. If you bought all of that, then I might just disappoint you.

This article will discuss the version of blockchain technology that is used for Bitcoin cryptocurrency. There are other implementations, and they may have eliminated some of the disadvantages of the “classic blockchain,” but usually everything is built around the same principles.c98PDPatJ47nGaWpCBAaBmvMpPTozuG0.jpg?s=da6c44138e29085fc802c90e8d4bfbc8

About Bitcoin in general

I consider the Bitcoin technology itself revolutionary. Unfortunately, Bitcoin has been used for criminal activities far too often,...

Read more...
About Kaspersky Lab
1
PSN: https://play.google.com/store/apps/details?id=com.ekathvatech.onlinemp3download
Taxi Trojans are on the way

Taxi Trojans are on the way

You’re in a hurry, trying to get to work, a business meeting, a date. So you launch your favorite app for booking a taxi as usual, but this time, it prompts you to enter your credit card number. Does that seem suspicious? It may not — apps forget information, and all you have to do is add your card number again.

However, after some time you notice money disappearing from your account. What happened? You may be the unlucky winner of a mobile Trojan. This kind of malware has been caught recently stealing bank data by impersonating the interfaces of taxi-booking apps.

rFZ_wvCg06gqOyXJIgK9-lobA2Mdvl-_.jpg?s=abf71f57cb189dcf638d49dd299e1799

The Faketoken Trojan has existed for a long time, and it has been upgraded for many...

Read more...
About Kaspersky Lab
0
What is HuMachine?

What is HuMachine?

We attribute the effectiveness of our products to the HuMachine Intelligence concept, which is a basis of what we call True Cybersecurity. The essence of HuMachine Intelligence is a fusion of three fundamental things: big data, machine learning, and our analysts’ expertise. But what is behind these words? Let us try to explain this without getting deep into technical details.

bTHYGBDtSWUbnM34BGF2H8kIwDK8o7NL.jpg?s=c62f4ff9a50740f49dc1990aaebb56beBig data and threat intelligence

The term big data should not be taken literally, as if it were a large array of information stored somewhere. It is not just a database; it is a combination of technologies that allows for instant processing of large volumes of data in order to extract threat...

Read more...
About Kaspersky Lab
0
Staying safe in 2018 and beyond

Staying safe in 2018 and beyond

Now that the Internet is a commodity, a familiar and ever-present resource, lots of people have gotten casual about its dangers. Others — kids — never knew a time without websites at their fingertips, and no more fear cyberthreats than they fear a television.

Some wags have even put it out there that they don’t think any paid security products are necessary. Just let Microsoft and Apple security do their thing, they say. Don’t pirate movies, go to shady websites, or open unexpected e-mail attachments and you’ll be fine, they say. Ignore the independent expert tests, they do.

In fact, with cybersecurity a complex, multilayered proposition, with...

Read more...
About Kaspersky Lab
0
Attacks on enterprise security: Microsoft services as a weapon

Attacks on enterprise security: Microsoft services as a weapon

Hackers have gone big with the exploitation of legitimate software. Several reports at the Black Hat 2017 conference demonstrated that Microsoft enterprise solutions could be quite useful in an attacker’s hands.

Companies that use hybrid clouds need to adopt different security considerations than those that use traditional cloud systems. However, in practice they are not updating fast enough, and that results in numerous security blind spots that attackers can exploit, as was demonstrated in July at the hacker conference Black Hat 2017. Studies showed how a typical office infrastructure can actually help attackers remain...

Read more...
About Kaspersky Lab
0
Cybersecurity depends on partnership

Cybersecurity depends on partnership

In the world of cybersecurity, partnerships are of much importance. Cybersecurity companies partner among themselves to share data and help each other build stronger security solutions that can better protect their users. They also partner with law enforcement agencies to fight cybercrime. Partnerships with software developers are equally important, because security solutions have to work smoothly with other software, especially with operating systems.

That, of course, can be easily achieved if the operating system vendor creates its own, fully compatible security solution. However, having just one security solution for each operating system is not...

Read more...
About Kaspersky Lab
0
Is your encrypted USB drive secure?

Is your encrypted USB drive secure?

How can you be sure the “secure” USB drive you’re using is really secure and the data you store on it can’t be extracted? That’s exactly the question Google’s security researchers Ellie Bursztein, Jean-Michel Picod, and Rémi Audebert addressed in their talk, “Attacking encrypted USB keys the hard(ware) way,” at the recent Black Hat USA 2017.

WY76gddwSMR0JlG7sVa-MUHet50uM7UX.jpg?s=e54bf31da134b5b4d5e45daf6aed63eb

Researchers say that at present, secure USB drive manufacturers are following the FIPS 140 certification standard, which was developed by NIST (the National Institute of Standards and Technology) for all kinds of cryptography modules, both hardware and software. The certification involves a...

Read more...
About Kaspersky Lab
0
Facebook’s CSO: Security specialists have to start solving real security problems and avoid the fancy ones

Facebook’s CSO: Security specialists have to start solving real security problems and avoid the fancy ones

During his opening talk at the Black Hat 2017 conference, Alex Stamos, Facebook’s chief security officer, talked about preventing actual damages and being OK with compromises — things that every information security specialist should be doing. This CSO at Facebook is no slouch: His team has been protecting a really complex IT system and 2 billion users’ worth of data.

Tqpy78MMBK11gcypTwenAAjKZJ76kOQW.jpg?s=82957f07e9f50b52592bec1052dd947e

According to Stamos, the security industry suffers from several adolescent problems, the main one being nihilism. That means specialists prefer to focus on “fancy,” technically complex security problems...

Read more...
About Kaspersky Lab
1
Breaking electronic locks — just like in those hacker movies

Breaking electronic locks — just like in those hacker movies

What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.

At Black Hat 2017, Colin O’Flynn, who presented a report on breaking electronic door locks, made a joke about the hardest challenge for characters in such a film — coming up with a brilliant line for that moment when the door opens.

GZ-_Uigf6uoCHYhMEiIyN-KmzAo2T2bW.jpg?s=761909e5878343edd02df650ec3ee4fa

To what extent is this consistent with reality?...

Read more...
About Kaspersky Lab
0
Impressive results on the anti-APT front

Impressive results on the anti-APT front

As we have mentioned before, we consider independent tests not as an indicator of our solutions’ effectiveness, but more as a tool to improve our technologies. Therefore, we rarely publish stories about test success, despite our products’ consistently high performance. However, the Advanced Threat Defense certification, conducted by ICSA Labs test lab is worth highlighting.

Wz6mRo3tne6vrjyxU8exeeTBhukUfPW5.jpg?s=ac7c606c009fb0cbdc1e99f7dd602721

Our Kaspersky Anti-Targeted Attack platform participated in this certification for three consecutive quarters and showed an excellent result in the latest — 100% threat detection and 0 false positives. Why is that important for corporate clients, and what is behind these...

Read more...
About Kaspersky Lab
0
Don’t Skype and type

Don’t Skype and type

Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it’s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.

Click, click, click — almost every person talking on the phone or Skype knows that his or her conversation partner may be chatting or doing something else while conversing. The sound of typing on a physical computer keyboard is rather recognizable.

inpbDtqmKD70255fKjKSukr48D4b2hOf.jpg?s=45cf34068daed51359d9a3a0a69c1859

It turns out that with help from machine learning and a computer it is possible to find out what your conversation partner is typing. Almost every keyboard has a slightly different...

Read more...
About Kaspersky Lab
1
ClickSte: I saw this on an episode of the Knight Rider revival a few years back (getting someones password from the sound of the keyboard) I dismissed it straig...
Hacking industrial robots

Hacking industrial robots

As unpleasant as it is to see a ransomware message pop up on your monitor, WannaCry or ExPetr/NotPetya are not worst-case scenarios. Researchers demonstrated far more physical cyberattacks at the Black Hat hacking conference.

2szS1qxVSxHs3sg1H6Xyj1pApdgVfyE6.jpg?s=568ec9ffdbad361b6cfcbb0955660536

Thousands of factories around the world employ robots whose mechanical manipulators move boxes around, drill through parts, and perform other actions by following preprogrammed routines. These robots are quite complex, consisting of a computer (used for monitoring by an operator), a controller, and a mechanical manipulator. A program with logical operations, such as “lift the box” or “turn the arm,” is created on the control...

Read more...
About Kaspersky Lab
0
Frequently asked questions about Kaspersky Free

Frequently asked questions about Kaspersky Free

The global launch of our Kaspersky Free antivirus has generated considerable public excitement and prompted many questions. It looks like it is time to sit down and take a look at what concerns people around the world and address everything with frank answers.

3YSiAcDjmclA2TjDYIKAtL9XUFcE-4dp.jpg?s=62769cde1dea23c312b332e9100756b2

Here are the top six questions and myths about Kaspersky Free.

1. There is no such thing as a free lunch. What’s the catch?

“No free lunch” is one of our favorite adages; however, there’s also an exception to every rule. Kaspersky Free is a completely free security solution that does not show any third-party advertisements. Kaspersky Free also does not collect your personal...

Read more...
About Kaspersky Lab
1
Big tips for small business

Big tips for small business

Last week was a big milestone for Kaspersky Lab. The company hosted a huge party to celebrate turning 20. Let that sink in for a minute — consider that when the company started out on its mission to save the world, these were the most popular pieces of technology on the Internet.

scNr0dCd4orYmKtGrOlk6V5wLmwppBYZ.jpg?s=617ed3cc8d03846f564bee181b04048f

During the first two decades of its existence, the company has thrived and also collected a series of best practices and tips from top-level executives. They chronicle the steps and challenges of going from start-up to established global player.

In the guide below, our executives chime in on everything from building a strong corporate culture to calculating risk to collaborating...

Read more...
About Kaspersky Lab
0
Kaspersky Battery Life: A long and happy life

Kaspersky Battery Life: A long and happy life

Modern smartphones are fast, powerful, and capable of practically anything. There is one catch, though: Give them a task and the battery charge evaporates. Actually, sometimes the charge vanishes for no apparent reason at all, because even when you are not doing anything, some app in the background can consume a lot of battery power without visibly doing anything. However, this can be prevented.
0rMOwiRkqPoOsIxHdyxgtrau3yq72aty.jpg?s=f44b2792b51ffd9c0fe3e6d9314beac3

Not every app needs to be continuously running in the background. Android has its own smart mechanism that helps free up RAM by terminating apps, but unfortunately, the mechanism is not trained to monitor for apps that consume too much battery power,...

Read more...
About Kaspersky Lab
0
Tips to educate your staff on cybersecurity

Tips to educate your staff on cybersecurity

Over the course of the two-day briefings at Black Hat 2017, a lot of interesting topics were discussed. Perhaps one of the more interesting topic areas was cybersecurity education. In fact, there were at least three panels on the topic.

An interesting point came up during a presentation from Arun Vishwanath of the University at Buffalo. He was discussing the problems with many cybersecurity training programs.

1sHKKzuztIJmMsiTG5ouWoIlf7NcHgAl.jpg?s=1b4840ad9c7fad3dd3bc81bf4fb5e178

During his talk, Vishwanath focused on the high proportion of employees who fall victim to spear-phishing despite having training in the workplace. He then challenged companies to look more at how they are offering training to employees...

Read more...
About Kaspersky Lab
0
Hacking a car wash?

Hacking a car wash?

Just when you think you’ve heard it all when it comes to connected devices being hacked, Black Hat rolls around and makes you reconsider what you thought were the most bizarre things ever hacked.

Thoughts may immediately jump to the latest and greatest connected IoT wearable or something odd like Google Glass — both good guesses — but they’d be wrong. Chances are you would never guess, but we’ll wait while you glance up again at the title of this post.

fJ25-Bs5pLE-furwhHF-7FPP7KXA6ht7.jpg?s=2fd2a23e5a3cd181410a0a961c67a8c6

You see, researchers Billy Rios and Jonathan Butts discovered that car washes could be hacked. OK — I know it does not sound all that exciting, but the researchers also noted that they had possibly...

Read more...
About Kaspersky Lab
0
No More Ransom: A very productive year

No More Ransom: A very productive year

A year ago we announced that together with Europol, Dutch police, and McAfee Security, we were starting a project called No More Ransom. We thought that joining forces against ransomware was a good idea, and now we know we were right.ip1k-6fQrNrCVgeY8kUC_GNrct6ZmyjT.jpg?s=90861e67264bdb697606e0473f96e1a0

Today No More Ransom celebrates its first anniversary, and for a 1-year-old it has achieved a lot.

Dozens of organizations from both the public and private sectors have joined the project, and so have law-enforcement agencies from countries all over the world. The number of decryption utilities available for free download has increased almost tenfold, and those utilities have helped decrypt files on tens of thousands...

Read more...
About Kaspersky Lab
0
KL AV for Free. Secure the Whole World Will Be.

KL AV for Free. Secure the Whole World Will Be.

Hi folks!

I’ve some fantastic, earth-shattering-saving news: we’re announcing the global launch of Kaspersky Free, which, as you may have guessed by the title, is completely free-of-charge! Oh my giveaway!ngouQxW5oxhCIA51sDhWtkwh-rTEyG-a.png?s=d77cfd90c7ecf7411301c6e940607f42

We’ve been working on this release for a good year-and-a-half, with pilot versions in a few regions, research, analysis, tweaks and the rest of it, and out of all that we deduced the following:

Read more...
About Kaspersky Lab
1
luixparraga: This is a breakthrough for the company in being able to be everywhere with Kaspersky Lab, economic benefit for the pockets of consumers in certain reg...