About Kaspersky Lab
Interesting news, information and useful information about KL products
Members
3653
Category
Entertainment
Scammers try to cash in on Burning Man

Scammers try to cash in on Burning Man

Every year, in late August or early September, tens of thousands of people gather in the Black Rock Desert in Nevada for the Burning Man arts event. For eight days, the festival becomes an epicenter for creatives from around the world. The monumental installations, spellbinding performances, and inimitable atmosphere of the festival attract huge numbers of visitors.

Burning Man tickets don’t grow on trees

Getting into Burning Man is not easy. Tickets are limited, and in recent years demand has far outstripped supply. So that they don’t get snapped up all at once, the organizers put them up for sale in stages.

And even then it’s not simply a case of...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 130

Transatlantic Cable podcast, episode 130

We open the 130th edition of the Kaspersky Transatlantic Cable podcast looking at a favorite topic of discussion: Facebook. It’s not the typical security-related incident you might expect; instead, we start with the company’s statements seeking regulation from governments.

Yes, friends, you read that right. Mark Zuckerberg is asking for governments to implement regulations on fake news, disinformation, or just bending of the truth.

After Facebook, we head to the dark web, where it appears that attackers are reusing Black Energy‘s code. From there, we jump to a cyberattack on Boston’s Children’s Hospital that is disrupting patient flow. Then, we...

Read more...
About Kaspersky Lab
0
Adventures in game ratings

Adventures in game ratings

It’s perfectly normal for kids to play games, including of the computer and mobile varieties, but not all games (or gamers) are the same. It’s not for nothing that game boxes and online descriptions contain age restriction info. So, should you panic if, say, your 10-year-old is hooked on the T-rated Fortnite? Let’s investigate who determines these classifications, the reasons behind them, and how strict they are in practice.

Who sets age restrictions on video games?

Roughly two dozen video game age rating systems exist worldwide. Most European countries, for example, adhere to the Pan European Game Information (PEGI) standard, and in the United States, Canada,...

Read more...
About Kaspersky Lab
0
What ISO 27001 certification is, and why we need it

What ISO 27001 certification is, and why we need it

Recently, TÜV AUSTRIA confirmed that the information security management system we apply using Kaspersky Security Network (KSN) infrastructure is in line with the ISO/IEC 27001:2013 standard in the delivery of malicious and suspicious files. TÜV also affirmed the safe storage and access to these files in the Kaspersky Lab Distributed File System (KLDFS). Here is what ISO/IEC 27001:2013 certification is all about.

What is ISO 27001?

ISO 27001 is an international standard with requirements for the creation, maintenance, and development of information security management systems. Essentially, it’s a collection of best practices addressing...

Read more...
About Kaspersky Lab
0
FAQ: Microsoft, Kaspersky and KB4524244 security update issues

FAQ: Microsoft, Kaspersky and KB4524244 security update issues

What happened?

Microsoft released security update KB4524244 as a part of its February 2020 Patch Tuesday. This update caused problems with some devices and Microsoft revoked it.

Why Kaspersky is involved in the story?

The update addresses a security vulnerability that was found in Kaspersky Rescue Disk, and then publicly disclosed in April 2019. This was later fixed in August 2019.

What is the Kaspersky Rescue Disk?

This is a free tool to clean your infected computer even if the operating system (OS) won’t load.

What was the vulnerability?

It was possible to run an untrusted UEFI image (e.g. custom operating system) on a...

Read more...
About Kaspersky Lab
0
Ginp mobile Trojan fakes incoming SMS messages

Ginp mobile Trojan fakes incoming SMS messages

Having infiltrated a phone, most mobile banking Trojans try to gain access to SMS messages. They do so to intercept one-time confirmation codes from banks. Armed with such a code, the malware owners can make a payment or siphon off funds without the victim noticing. At the same time, many mobile Trojans use text messages to infect more devices by sending the victim’s contacts a bad download link.

Some malicious apps are more creative, using SMS access to distribute other things in your name, such as offensive text messages. The Ginp malware, which we first detected last fall, can even create incoming texts on the victim’s phone that no one...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 129

Transatlantic Cable podcast, episode 129

Welcome to the 129th episode of the Kaspersky Transatlantic Cable podcast! Dave and I cover a handful of stories that you may have missed but should be aware of, and take you behind the scenes of the upcoming Kaspersky Security Analyst Summit, AKA #TheSAS2020 coming up in April.

To kick things off, we discuss a story about a new warning from the UK police, who are warning businesses that cybercriminals may be employing cleaning services to gain access to corporate networks.

From there, we head to Wisconsin, where we look at a ransomware attack on the city of Racine. Details are still emerging, but the municipality has noted that it will not be...

Read more...
About Kaspersky Lab
0
Twitter settings: How to protect your account and data

Twitter settings: How to protect your account and data

The world’s most dynamic social network brings together all kinds of people: stars, politicians, journalists, IT experts, and just sociable types. Alas, like any other big Internet community, Twitter is not immune to bots, troublemakers, spammers, and even scammers. We explain what security and privacy settings will help keep them at bay.

Read more...
About Kaspersky Lab
0
Should you buy a smartphone for your kid?

Should you buy a smartphone for your kid?

Many kids today get their first smartphones when they are 11–12 or even younger. A majority carries a gadget around by the time they are in high school. Peer pressure does play a role, and phone-free kids see everyone around them fidgeting with their phones. The decision is yours, however, and in this post we discuss the pros and cons of that purchase, as well as provide tips for choosing a gadget if you decide to buy one.

No one but you is in a position to say if your kid needs a phone or can handle the responsibility of having a phone. In every single case, buying a smartphone for your kid carries pros and cons.

A smartphone for your kid: Cons
Read more...
About Kaspersky Lab
0
Will an immobilizer save your car from being stolen?

Will an immobilizer save your car from being stolen?

Automobiles are getting ever smarter, and cracking them with a crowbar and a screwdriver is getting ever more difficult. Statistics back up that assumption: According to research from Jan C. van Ours and Ben Vollaard highlighting car theft and recovery data, vehicle theft decreased by 70% between 1995 and 2008 in the Netherlands and by as much as 80% in Great Britain.

One of the causes of the decrease is the ubiquitous introduction of so-called “immobilizers.” Immobilizers, however, are just as susceptible to cracking as any other relatively complex technology. Cybersecurity researcher Wouter Bokslag chose this as the subject of his Read more...

About Kaspersky Lab
0
Coronavirus phishing

Coronavirus phishing

Some malefactors just don’t know when to stop. First, we saw malware masked as files about coronavirus, and now they’re sending phishing e-mails that exploit the very same epidemic.

Phishing with the coronavirus for e-mail credentials

The letters appear to come from the Centers for Disease Control and Prevention, which is a real organization in the United States, and they do recommend some actions regarding the coronavirus. The e-mails also come from a convincing domain, cdc-gov.org, whereas the CDC’s real domain is cdc.gov. A user not paying careful attention isn’t likely to notice the difference.

The letters claim that the CDC has “established a management system...

Read more...
About Kaspersky Lab
0
Backing up is no panacea when blackmailers publish stolen data

Backing up is no panacea when blackmailers publish stolen data

Backing up data has been one of the most effective, though labor-intensive, safeguards against encrypting ransomware so far. Now, malefactors seem to have caught up with those who rely on backups. The creators of several ransomware programs, confronted with victims refusing to pay the ransom, shared their data online.

Data publication makes threats into reality

Threats to make confidential information public are nothing new. For example, in 2016, the group behind the cryptoware that infected the San Francisco Municipal Railway‘s systems tried that trick. They never followed through on their threat, though.

Maze was the first
Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 128

Transatlantic Cable podcast, episode 128

We begin the latest episode of the Kaspersky Transatlantic Cable podcast looking at recent research from the Electronic Frontier Foundation (EFF) — and an interesting unsecured server.

The research from the EFF focuses on one of our favorite topics: privacy. In this case, the privacy violation is Ring’s sharing data with third parties. Sticking with the topic of privacy, we hop across the pond and look at the GDPR — everyone’s favorite topic. This week, we discuss the financial impact of the regulation and compare it with regulations in the US.

For our third story, we jump into the world of corporate espionage. This fitness-related story has some...

Read more...
About Kaspersky Lab
0
Faking e-mails: Why it is even possible

Faking e-mails: Why it is even possible

Sometimes it’s easy to spot phishing e-mails just by checking the “From” field. However, that’s not always the case; making a fake e-mail indistinguishable from a genuine one actually is possible. If an attacker knows how to do such a thing, the targeted organization is really in trouble. Most people wouldn’t have a second thought before clicking on a malicious link or file that they got in an e-mail seemingly from their boss or their top client — and it’s hard to blame them, especially if there’s no way to tell the e-mail was spoofed.

But why is it possible to forge a perfect fake e-mail in the first place? Andrew Konstantinov’s talk on e-mail...

Read more...
About Kaspersky Lab
0
How to protect your TikTok account

How to protect your TikTok account

Every day, millions worldwide watch short-form videos on TikTok and share their own clips. Some do it to be creative and sociable; others are seeking popularity. But as in any online community, TikTok is not just a platform for cool bloggers and their fans. It is also home to haters, spammers, and scammers. We tell you what security and privacy settings will help protect your account from them.

Read more...
About Kaspersky Lab
0
What to do about Windows 7’s end of life

What to do about Windows 7’s end of life

Excerpt: End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify As you know, January 14 saw the end of extended support for Windows 7. Just three days later, Microsoft published information about a vulnerability in the Internet Explorer browser that an attacker can use to gain the same rights as an active user.  The majority of companies still using Windows 7 will likely not receive a patch for this vulnerability. Sure, paid support will continue until January 10, 2023, but not all companies consider that economically viable. So now is definitely the time for some brainstorming followed by action....

Read more...
About Kaspersky Lab
0
Where is my child? A solution for worried parents

Where is my child? A solution for worried parents

Kids can go from the playpen to the schoolyard in the blink of an eye, and with every inch of freedom they earn, keeping tabs on their movements becomes harder. For example, you might not even know for sure whether your bundle of joy is attending class.

Even if that box is checked, you still have lots of other big-city dangers (which intersect plenty with small-town hazards) to worry about. Left to their own devices, children can come into contact with bad people, poke around hazardous industrial sites, or get lost in an unfamiliar area. And that’s just in an average week!

How to keep track of your kid with geofencing

Some parents,...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 127

Transatlantic Cable podcast, episode 127

For the 127th episode of the Kaspersky Transatlantic Cable podcast, Dave and I start by looking at a story about an interesting unsecured server. Unlike many recent stories that mention insecure AWS or Azure servers at random companies, this one comes from Microsoft’s support.

Although the server has since been secured, it is worth double-checking that you are really chatting with the company should you be looking for support.

Following that story, we look at some vulnerabilities in Apple’s anti-Web-tracking features.

The third story is about Mozilla’s recent move in its battle against malicious browser extensions: banning about 200 add-ons from...

Read more...
About Kaspersky Lab
0
Need to separate child from phone? Kaspersky Safe Kids can help

Need to separate child from phone? Kaspersky Safe Kids can help

Almost every home has a computer, and many children have a smartphone by the time they enter junior high. On the one hand, this is good: Children grow up tech savvy, and parents can call them at any time to check if everything’s OK. But on the other hand, every silver lining has a cloud.

Children glued to the phone

Kids can sit in front of a phone screen seemingly for days on end, ignoring things like playing outside, chatting with friends, and homework. Their education, social skills, and even health can suffer. Hours-long gaming, YouTube, and social media sessions can likewise have adverse effects on posture and vision....

Read more...
About Kaspersky Lab
0
The curious vulnerabilities of ordinary MEMS

The curious vulnerabilities of ordinary MEMS

Digital devices now have “sense organs” to help them interact with the physical world. On the one hand, that’s awfully convenient for users. But on the other hand, it creates new threats, and they’re often quite unexpected ones. Even though electronic sensors are functionally similar to their human analogs, they are still very different in terms of design and capabilities — and designers don’t always take those differences into account.

Consider, for example, ultrasound commands, which are inaudible to humans, but which voice assistants hear and obey. Well, hacking a voice-responsive assistant with the help of sound, even if that sound is...

Read more...
About Kaspersky Lab
0
2020 Midori Calendar

2020 Midori Calendar

If you or your children love our green bear mascot, Midori Kuma, as much as we do, you won’t need persuading to get hold of the new Midori calendar. For the past year, we’ve been working with talented artist Vasily Yaltonsky to “green up” some of the most famous paintings ever created.

We assembled the pictures into a 12-month calendar, which we are now giving away to our friends. Below, you can download the free pictures in wallpaper format for your PC, smartphone, and tablet.

January
0JXLGi5ArirUPomr6wsM0_jqWsQh8SeK.jpg?s=1f004d4277e861580e5b7294d7a38037

Pieter Brueghel the Younger. A Winter Landscape with Skaters

iPhone

iPhone 6 Plus, 6s Plus, 7 Plus, 8 Plus
iPhone 6, 6s, 7, 8
iPhone SE
iPhone XR
iPhone XS
iPhone XS Max

iPad

...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 126

Transatlantic Cable podcast, episode 126

Dave and I open up the 126th episode of the Kaspersky Transatlantic Cable podcast by following up on the Travelex story from last week. While not a resolution or “mission accomplished” moment, it is more of a warning about new phone-based scams targeting customers of the company.

For the second story, we look to the adult industry and an unfortunate data breach. Unlike many breaches that have similar personal identifiable information exposed, this breach exposes that and more including tattoos, scars, and photos of passports. From there, we head to an unsecured server from Peekaboo moments that shared intimate moments of babies.

While discussing...

Read more...
About Kaspersky Lab
0
RIP Windows 7. What now?

RIP Windows 7. What now?

All good things must come to an end, and the time has finally come to say goodbye to Windows 7. As of January 14, 2020, Microsoft has officially stopped supporting the operating system, which means no more automatic (or requested) downloading and installation of updates and fixes, and no patching of new vulnerabilities.

That vulnerabilities abound in Windows 7 is beyond doubt — and not because Microsoft is bad at programming. Any operating system is a complex beast, consisting of myriad components and many millions of lines of code, so avoiding bugs is impossible without sacrificing speed and convenience. Cybercriminals will always be out there searching for...

Read more...
About Kaspersky Lab
0
Web-threat protection and targeted attacks

Web-threat protection and targeted attacks

How do cybercriminals get inside corporate infrastructure? Movie plot devices where an infected flash drive is left lying around do occur in real life, but not all that often. Over the past ten years, by and large, the main threat delivery channels have been e-mail and malicious Web pages. With e-mail, everything is fairly clear: a security solution with a decent antiphishing and antivirus engine on the mail server will eliminate most threats. By comparison, Web threats usually get much less attention.

Cybercriminals have long been using the Web for all kinds of attacks — and we don’t just mean phishing pages that steal users’ credentials for...

Read more...
About Kaspersky Lab
0
You, me, and Facebook makes three

You, me, and Facebook makes three

Some smartphone apps remind users to take their medicine; others monitor sleep quality, count steps and calories, and so on. There’s no shortage of apps to monitor our health and wellbeing. Often such programs require users to share very personal data about their feelings, moods, diagnoses, and more. Alas, not all of them handle such private information with the care it requires.

At 36C3, the human rights organization Privacy International shared the results of studying intimate apps that help women predict their periods, monitor reproductive health, and plan pregnancies. As it turned out, some of them abused the trust of users all the way up to sharing...

Read more...
About Kaspersky Lab
0