About Kaspersky Lab
Interesting news, information and useful information about KL products
Members
3656
Category
Entertainment
COVID-19 survival guide for your digital life

COVID-19 survival guide for your digital life

All of a sudden, we find our entire lives playing out online. Never before has the connected world — and our ability to communicate, socialize, work, and transact online — been more front-of-mind, or more critical. Although the ability to do so much online is incredible, the reality is, where people go, cybercriminals follow. If an opportunity exists to exploit a situation and lure people into disclosing personal data or relinquishing their money, you can guarantee that cybercriminals will be working on it.

We have already seen examples of malware related to 2019’s novel coronavirus, aka COVID-19, trying to piggyback on the virus, hiding...

Read more...
About Kaspersky Lab
0
10 mobile games for child development during social distancing

10 mobile games for child development during social distancing

My Sunday morning began with a message from a Kaspersky Daily editor: “Denis, a while back you wrote about developmental games for children. That post of yours is a bit out of date now, but the topic is more relevant than ever, with millions of families trying to coexist in self-isolation. How about a new one?”

One of the surprises of social distancing * for my family has been the blurring of certain boundaries. Workdays and weekends look about the same, but something new has emerged: a sort of hybrid time. We maintain our learning and working duties, but we also have a lot of time that used to get eaten by commuting and...

Read more...
About Kaspersky Lab
0
Enumeration attack dangers

Enumeration attack dangers

Recently, while testing a blockchain platform for vulnerabilities, our Kaspersky Blockchain Security experts found that the platform’s password recovery process was vulnerable to an attack through user name enumeration. Web developers need to be aware of this kind of attack and its dangers.

What’s an enumeration attack?

Web applications with password and login authentication typically include several components that interact with the user database: the login window (for obvious reasons), the registration form (to avoid duplication of user names), and the password reset page (to make sure that the corresponding account exists). If Web developers do not implement...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 136

Transatlantic Cable podcast, episode 136

For this week’s edition of the Kaspersky Transatlantic Cable podcast, Dave and I return to a bit of normalcy while also adding in another interview with a member of our larger Kaspersky team.

We kick off the session discussing with the UK removing broadband caps during the Covid-19 pandemic. From there, we jump onto the Zoom wagon, where we look at how the company has removed some data sharing with Facebook that had users uneasy.

Our third story takes a look at the latest scam on YouTube: attackers taking over accounts, posing as Microsoft, and trying to rope users into a cryptocurrency Ponzi scheme. Please don’t fall for this.

We then sit down...

Read more...
About Kaspersky Lab
0
Twitch security and privacy settings

Twitch security and privacy settings

At the end of January, when users’ monthly hours watched surpassed 1 billion for the first time, Twitch developers must have been jumping for joy. The world’s leading video streaming service continues to grow, and if you’re a gamer and like to watch others play, most likely you’re already signed up.

Alas, like any popular service, Twitch is also home to account hijackers, spammers, and haters. This article explains how to protect your account, whether you’re a regular follower or a top streamer.

Read more...
About Kaspersky Lab
0
Dangerous holy water

Dangerous holy water

At the end of 2019, our experts used the watering hole technique to uncover a targeted attack. Without deploying any sophisticated tricks or exploiting any vulnerabilities, the attackers infected user devices in Asia over a period of at least eight months. Based on the subject matter of the websites used to spread the malware, the attack was christened, yes, Holy Water. This is the second attack we have discovered in several months to use such tactics (see here for our researchers’ other find).

How did Holy Water infect user devices?

It appears that the attackers at some point compromised a server hosting Web pages belonging mainly to religious figures, public...

Read more...
About Kaspersky Lab
0
5 tips for not bungling home videoconferencing

5 tips for not bungling home videoconferencing

The current pandemic has turned videoconferencing into a vital tool for both work and personal communication. We explain how not to goof up in front of the boss or, worse, the mother-in-law.

Oddly enough, the choice of application is far from the most important part. Most services provide similar features, and unless you have some specific requirements, you can just use what’s on your machine already — or whatever the majority of participants use.

Most companies have their own teleconferencing standards and tend to use a certain platform, be it Skype, Google Hangouts, Zoom, or Microsoft Teams. As for the mother-in-law, the choice is likely...

Read more...
About Kaspersky Lab
0
LightSpy spyware targets iPhone users in Hong Kong

LightSpy spyware targets iPhone users in Hong Kong

In January of this year, experts detected a large-scale watering-hole attack aimed at residents of Hong Kong, in which the multifunctional malware LightSpy for iOS was installed on victims’ smartphones. This is yet another reminder to anyone who thinks that Apple devices, in particular iPhones, are immune to malware; they are protected, of course, but by no means totally.

How LightSpy infects iOS devices

The malware landed on victims’ smartphones when they visited one of several websites disguised as local news resources — the attackers simply copied the code of real news outlets and created their own clones.

The sites loaded a whole...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 135

Transatlantic Cable podcast, episode 135

Hello everyone! Hopefully you are practicing social distancing and staying sane whilst working. For the 135th edition of this week’s Kaspersky Transatlantic Cable podcast, Dave and I continue our quest to bring positive vibes to your remote workday.

This week, we sat down with Kristina Branchugova of the brand team at Kaspersky. While she may work on the brand side of things, Kristina has a very interesting hobby outside of the office — gaming.

During our chat, we discuss everything from why I keep breaking brand guidelines to joining a World of Warcraft Guild to the future for Kaspersky.

If you like what you heard, please consider sharing with...

Read more...
About Kaspersky Lab
0
Coronavirus as a hook

Coronavirus as a hook

E-mails imitating business correspondence with malicious attachments are nothing new. We’ve been observing them in junk traffic for the last three years at least. The more precise the fake, the higher the likelihood that the victim will not suspect anything.

Such phishing is especially dangerous for employees of companies that sell goods, because e-mails with delivery requests or orders are run-of-the-mill. Even someone trained to spot a fake can sometimes struggle to determine whether a message is phishing or a legitimate order from a client. Therefore, the number of convincing yet fake e-mails keep on growing. They are not encountered as often as traditional...

Read more...
About Kaspersky Lab
0
How to keep your smartphone coronavirus-free

How to keep your smartphone coronavirus-free

The coronavirus pandemic certainly seems to have taught people to wash their hands thoroughly after visiting public places and to touch their face less often. However, not everyone has caught on to another useful tip — disinfecting gadgets, in particular the one we pick up a hundred times a day that also often touches our face. We explain why it’s important to clean your smartphone and how to do it properly.

Why disinfect your smartphone

The first thing to remember is that at room temperature coronavirus can survive and remain infectious on metal, glass, ceramic, and plastic for several days. The virus can get onto a phone in two ways: either...

Read more...
About Kaspersky Lab
0
Updated protection for Microsoft Office 365

Updated protection for Microsoft Office 365

When a company needs to migrate its employees to home working, the IT department often has to scramble to find the right tools for remote collaboration. The usual criteria are usability, ease of setup, and security. Quite often, the choice is made in favor of  Microsoft Office 365. Despite being convenient, its security  can be beefed up. Our solution for MS Office 365 has been on the market for several years now, and we are constantly refining it. Today, we are releasing an update that focuses specifically on enhancing collaborative software security.

Protecting Microsoft Office 365 collaboration tools

Generally speaking, any collaboration...

Read more...
About Kaspersky Lab
0
People infected with coronavirus are all around you, says Ginp Trojan

People infected with coronavirus are all around you, says Ginp Trojan

As people all around the world started working from home and practicing social distancing, the latter in some cases may evolve into paranoia. Should I avoid contacting everyone, because, who knows, maybe this person has contracted the coronavirus. Or maybe that one? People became somewhat afraid of all other people. And cybercriminals decided to make use of that.

The Coronavirus Finder (that doesn’t work)

Cybercriminals behind Ginp, a banking Trojan that we have covered recently (here’s a post about Ginp on Kaspersky Daily), are up to a new campaign related to COVID-19. After Ginp receives a special command, it opens a...

Read more...
About Kaspersky Lab
0
Zero-day vulnerabilities in Adobe Type Manager Library affects multiple Windows OSs

Zero-day vulnerabilities in Adobe Type Manager Library affects multiple Windows OSs

Microsoft has issued a warning about two new vulnerabilities in the Adobe Type Manager Library. Moreover, according to their information, some attackers are already exploiting them in targeted attacks.

What is Adobe Type Manager Library and how is it vulnerable

There were times when, to see proprietary Adobe fonts in Windows, you had to install additional software — Adobe Type Manager. This was not very convenient for the end users, so Adobe eventually opened the specifications for its formats and Microsoft built the font support into its operating systems. This is what Windows Adobe Type Manager Library...

Read more...
About Kaspersky Lab
0
Protecting health care

Protecting health care

For the average, law-abiding person, the coronavirus COVID-19 is simply a health hazard. Unfortunately, some cybercriminals perceive the epidemic as an additional opportunity to launch a cyberattack. Right now, medical organizations need qualified information infrastructure protection as never before.

Incidents

Taking advantage of widespread public fears about COVID-19, phishers began to use the topic as a hook. That’s maybe half the trouble — without the coronovirus, they would have used something else. But consider opportunistic cybercriminals attacking the information infrastructure of medical institutions, obviously hoping that with the general overload on IT...

Read more...
About Kaspersky Lab
0
Remote working safety and security

Remote working safety and security

In recent months, COVID-19 has taken over the world. Countries are closing borders, production lines are halting, and many employers are instructing employees to work from home. That makes sense: If companies are to continue functioning, and if your job is location-neutral, staying home reduces the likelihood of catching and transmitting the coronavirus while letting you continue doing your job.

However, working in the office and working at home are two different kettles of fish (or indeed phish). And not only because the office has a working atmosphere, whereas at home you just want to lie on the couch and pet the dog.

The real issue — at least for...

Read more...
About Kaspersky Lab
0
Top 5 threats for online gamers

Top 5 threats for online gamers

Not so long ago, most people regarded gaming as something for kids and maybe teens, nothing adults really needed to worry about. We’re not sure precisely when that changed, but with gaming now reputable and ubiquitous, we all have a new front to guard against cybercriminals.

The chances are good that you play an online game — or more than one — at least occasionally. Whether you use a gaming console, a PC, or your phone, whether you play 10 minutes while commuting or every spare evening and weekend hour is not important. If you play, then you need to know and avert the risks associated with your gaming online.

Specific game exploits and hacks of game...

Read more...
About Kaspersky Lab
0
Moving security beyond the generational divide

Moving security beyond the generational divide

One of the biggest no-nos in the business world is talking about age. However, I found myself in a session about just that at RSA Conference 2020.

Before your HR radar goes off, this is not about ageism or other common prejudices. It was a talk from Ben Smith, RSA’s Field CTO (US), and it focused more on how today’s workplace really comprises four well-defined generations (traditionalists, baby boomers, Generation X, and millennials), not to mention “cuspers,” or people straddling two of the traditional buckets, who tend to share some traits of both.

The reason this is important for the business world, and the security world in particular,...

Read more...
About Kaspersky Lab
0
7 steps to minimize game lags in Windows 10

7 steps to minimize game lags in Windows 10

Losing a multiplayer match because your computer suddenly froze for 50 milliseconds can be bitter. The good news is that you can prevent this mishap in the vast majority of cases. In this post we focus on the software-related problems and solutions that are most common for modern gamers. These seven tips will help you minimize performance-related defeats.

1. Rule out Internet issues

Make sure your Internet has stable speed and latency (signal delay). Open your Web browser and navigate to a comprehensive speed testing service such as speedtest.net or dslreports.com. Make sure that Internet speed is adequate (most games will do fine with 10...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 134

Transatlantic Cable podcast, episode 134

For the 134th edition of the Kaspersky Transatlantic Cable podcast, Dave and I take a break from our usual programming because COVID-19 has turned the world on its head.

Now, Dave and I work remotely close to 100% of the time, so on this episode, we discuss our setups as well as some best practices we have worked out.

As much of the global workforce moves to remote work for at least the foreseeable future, security is top of mind for us. To help you work securely, Dave sat down with David Emm from Kaspersky’s Global Research and Analysis Team to discuss best practices. On the news front, for job seekers out there, companies are now holding...

Read more...
About Kaspersky Lab
0
How to deal with BEC attacks

How to deal with BEC attacks

Cybercriminals are constantly on the lookout for new ways to attack companies. In the past few years, they have increasingly resorted to business e-mail compromise (BEC) attacks that target corporate correspondence.

The US Internet Crime Complaint Center (IC3) alone reported 23,775 such incidents to the FBI in 2019 — an increase of 3,500 from 2018, plus a rise in damages from $1.2 billion to $1.7 billion.

What is a BEC attack?

A BEC attack is defined as a targeted cybercriminal campaign that works by:

  1. Initiating an e-mail exchange with a company employee, or taking over an existing one;
  2. Gaining the employee’s trust;
  3. Encouraging actions that are detrimental...
Read more...
About Kaspersky Lab
0
The dangers of MonitorMinor stalkerware

The dangers of MonitorMinor stalkerware

Using stalkerware isn’t just unethical, it’s inherently unsafe. The first point hardly requires further explanation. As for the second, the problem is this: Spying apps steal vast amounts of confidential data from devices and send it over the Internet, and their creators care not a jot about protecting it.

How the data is stored or transmitted to the command-and-control (C&C) server isn’t generally known. Consequently, it is impossible to predict how many people might gain access to it. Given the rapid development of stalkerware functionality, the data gathered by stalkerware being re-stolen or leaked can become an even bigger headache for victims...

Read more...
About Kaspersky Lab
0
Telecommuting and security

Telecommuting and security

Because of the COVID-19 outbreak, many companies are ordering staff to work from home, including some that never even considered it before. That means they have no telecommuting policies in place and are thus unlikely to give due consideration to the increased risks of switching to remote working. We will attempt to close this gap and explain how to minimize the risks.

At first glance, the only change for office workers is the lack of face time with colleagues. But there’s a lot more to it than that. Consider, for example, communication channels, established routines, collaboration tools, equipment, and access to that equipment.

Communication channels

When your...

Read more...
About Kaspersky Lab
0
CVE-2020-0796: New vulnerability in SMB protocol

CVE-2020-0796: New vulnerability in SMB protocol

Updated on March 12
News has emerged of the CVE-2020-0796 RCE vulnerability in Windows 10 and Windows Server operating systems, affecting the Microsoft Server Message Block 3.1.1 (SMBv3) protocol. According to Microsoft, an attacker can exploit this vulnerability to execute arbitrary code on the side of the SMB server or SMB client. To attack the server, one can simply send a specially created package to it. As for the client, attackers have to configure a malicious SMBv3 server and persuade a user to connect to it.

Cybersecurity experts believe the vulnerability can be used to launch a worm similar to WannaCry. Microsoft calls the...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 133

Transatlantic Cable podcast, episode 133

For the 133rd edition of the Kaspersky Transatlantic Cable podcast, we set clear boundaries of what Dave and I are not experts on. Spoiler: it is a pretty large list.

To kick things off, we look at the digital impact of the novel coronavirus (aka COVID-19). Like many major world events, cybercriminals are using this as a platform for illicit gains. Be careful what you click on, friends.

From there, we hop over to a story about the tables being turned on a scam call center in India. Now, the actions were of questionable legality, but those of us who have been spam-called by one of these centers will still find it somewhat rewarding. The third story...

Read more...
About Kaspersky Lab
0