About Kaspersky Lab
Interesting news, information and useful information about KL products
Members
3648
Category
Entertainment
How Kaspersky’s new brand is engineered to bring on the future

How Kaspersky’s new brand is engineered to bring on the future

VixirPnKruNnQj4OyoersAKnNdtK51Qj.jpg?s=a15dd8bb0479597ba737a80ed3e034b7

As you may already have noticed, we have a new look. A radical new haircut, if you will. We trimmed the “Lab” and are now just Kaspersky.

But the new look is more than just dropping a few letters and adding a fresh coat of paint. That’s just the start. Our new mission is: Building a safer world.

That’s all of our customers’ futures: families, individuals, and businesses of all types and sizes all over the world, from the Kuril Islands to Kathmandu.

And just like the first step in any big journey, it starts at home. Here’s our founder, Eugene Kaspersky, on the idea behind our new identity.

But this post isn’t just about the...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 101

Transatlantic Cable podcast, episode 101

For episode 101 of the Kaspersky Transatlantic Cable podcast, Dave and I jump from one side of the pond to the other for a number of security related topics before ending with a story completely out of the security space.

L_E9LW8QDAZHHZdho0yyWXeylVINpodc.jpg?s=ce7aae8c330a4e48c71997d7d62dc0ad

Our first story looks at a new Facebook UK service, the result of a man winning a lawsuit against fake ads using his image. From there, we stay on the topic of Facebook and its whopping $5 billion fine from the FTC.

Our third story of the week takes a look at how people are now learning that Google employees are listening to recordings from Google Home. Following that story, we discuss how smart meters in the UK are switching to...

Read more...
About Kaspersky Lab
0
How to build an effective SOC

How to build an effective SOC

Not so long ago, we needed to explain what a security operations center (SOC) is to our enterprise audience. Now, more than a third of large organizations already have such a department, and many more are thinking about establishing one. When they do, however, they run up against something that’s becoming a major problem in the cybersecurity industry: a shortage of skilled professionals. Of course, that is not the only factor that affects SOCs, but it’s the root problem.

Of course, anyone can buy instruments and solutions, subscribe to threat data feeds, and assemble a team of watchers to look after those instruments, hoping that prepares then for a...

Read more...
About Kaspersky Lab
0
Smart home hacks

Smart home hacks

Smart home technologies are designed to make life easier and more convenient. However, new conveniences also mean new problems. The dangers of automating anything and everything are a frequent topic of conversation and blogging around here. For starters, hooking up home appliances to the Internet makes you dependent on the connection quality and server operation. At the same time, cybercriminals can use those points of entry to seize control of vulnerable equipment and use it to their own advantage.

UYSmNoE5RBDjyEbfoO-fNnJHxY-IoHH2.jpg?s=daee10d5ae1da129e78708f21e6136b0

As recent studies have shown, numerous means still exist to take control of a smart home. One such trouble spot, for example, could be a vulnerability in the cloud server...

Read more...
About Kaspersky Lab
0
Building trust together with Disclose.io

Building trust together with Disclose.io

Why did you buy this antivirus and not that one? Because this one costs less Because you trust it more, of course. And why do security researchers spend more time analyzing this app and not that one? Because they trust the company that developed the first app more. Not all businesses welcome news about vulnerabilities being found in their products — some actually threaten the researchers with legal action.

Xg56vqJ21r1OxzsrDbPVYMsqzr_2yW4p.jpg?s=7dfa6edc2992ba10ebb291d89d0b68d0

So, yes, in general, choosing a product or company is about trust. One mistake is enough to ruin the trust, but building it is significantly harder. It’s like a tower consisting of thousands of bricks — removing one brick may be enough for the...

Read more...
About Kaspersky Lab
0
FinSpy — commercial spyware

FinSpy — commercial spyware

What happens when spyware is developed not by underground malware coders, but by a serious IT firm? The result can be a nasty thing like FinSpy (also known as FinFisher), which has been developed and sold perfectly legally by Anglo-German company Gamma Group for quite some time now. Over the past year, we’ve detected this spyware on dozens of mobile devices.

6EYpuPjcZi62mlVU2IhBQMtSe8CwFiER.jpg?s=2eaa715c727bec2e3777b95f2d3d891bWhat FinSpy gets up to

Although a desktop version of the spyware exists (not only for Windows, but also for macOS and Linux), the greatest danger largely comes from mobile implants: FinSpy can be installed on both iOS and Android, with the same set of functions available for each platform. The app gives an...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 100

Transatlantic Cable podcast, episode 100

rufd2oYZkmTRVFUCHGGRr13cem3hQZzG.jpg?s=099e7f38b4a1e3d45ad9f0b81dff553f

We have hit the century mark for the Kaspersky Transatlantic Cable podcast. To kick things off, we look back on some interesting stories from our first podcasts. The first is Burger King’s crypto-venture in Russia. We follow that up with some NSA security posters.

This week’s chat starts with the story of Marriott and British Airlines breaches in the context of GDPR. From there, we head deep underground for a proposed Wi-Fi monitoring program from Transport for London. It’s supposed to increase operational efficiency, but it’s also raising the eyebrows of privacy watchdogs. To wrap up the episode, we look at Instagram’s latest test in the battle...

Read more...
About Kaspersky Lab
0
Data leak costs £183 million

Data leak costs £183 million

The British Information Commissioner’s Office (ICO), reported that it is going to fine British Airways £183 million for last year’s data loss. For some perspective, that’s several hundred times Facebook’s EU fine for the Cambridge Analytica case. In this post, we look at what went wrong, why there was such a difference in fines, and why it is a good idea to think about data protection in advance.

J6NjCDftNVWyDhMb9r0xybVOyWL0FM_p.jpg?s=859c8eb485879e118e625f7298383239The British Airways data leak — what went wrong?

Last fall, British Airways reported that from August 21 to September 5, outside malefactors had access to the data of users who bought or changed tickets through the company’s website or mobile app. The attackers stole...

Read more...
About Kaspersky Lab
0
Remote access — for a scammer

Remote access — for a scammer

Paradoxical as it may sound, a polite request is one of the simplest ways to get access to your computer. Intruders will use all sorts of pretexts — from technical troubleshooting to (ironically) cybercrime investigation. Learn what tricks they may use and why they are never to be trusted.

KQSzNfdUmLBidSQJEaJ2eIp0FatBIovS.jpg?s=db53dbf3754d245a8e5398a36850ac22Fake tech support

One day you receive a phone call from someone addressing you by name and introducing themselves as a tech support specialist of a large software company. It turns out, they say, your computer has serious problems which must be dealt with urgently. For that purpose, you are to install a special utility program and give the caller remote access to your...

Read more...
About Kaspersky Lab
0
How to update apps on your smartphone

How to update apps on your smartphone

We cannot overstate the importance of updating apps from time to time for the sake of security. Use outdated apps and attackers could spy on you through a call on WhatsApp, hijack your Xiaomi using a bug in the built-in antivirus, or something else. But do you know where and how to look for updates? Let’s investigate.

aKfLE5h3W44xF9oSS4oZTdqV87u31dai.jpg?s=167582a4a2ec0dc6ae52fa2d5220ccfbWhere do iOS and Android app updates hide?

Suppose you decide to update WhatsApp. What will you do? Go to the app settings? That would be logical — but pointless. Open your smartphone settings and peruse the app management section? Alas, that won’t help either.

In fact, all app updates are centralized and handled by the official store,...

Read more...
About Kaspersky Lab
0
Sodin ransomware enters through MSPs

Sodin ransomware enters through MSPs

At the end of March, when we wrote about a GandCrab ransomware attack on an MSP’s clients, we figured it was unlikely to be an isolated case.  Managed service providers are just too tempting a target for cybercriminals to ignore.

It appears we were right. In April, ransomware dubbed Sodin captured our experts’ attention. It differed from the others in that in addition to using gaps in MSPs’ security systems, it also exploited a vulnerability in the Oracle WebLogic platform. And whereas it’s typical for ransomware to require a user’s involvement (for example, the victim would need to launch a file from a phishing letter), in this case, no user...

Read more...
About Kaspersky Lab
0
Remote tech support, yet another risk factor for business

Remote tech support, yet another risk factor for business

In large companies, the IT department usually handles the tasks of installing and configuring business software for every one of its computers. For a small team, however, having even one dedicated specialist may prove to be an unjustified luxury. Most SMB companies have to make do with a revolving cast of part-time sysadmins, who are not always available. So in some cases employees have to set up their own workplace software.

-kD4XALpwTPId-D2EIZitUJi6GhGgepi.jpg?s=b9c3bb328fb9d283d249643df17e9211

But not everybody knows how to set up a complex solution, even with a manual. If something goes wrong, if the admin is unreachable or missing, and nobody in the office is familiar with the problem, some...

Read more...
About Kaspersky Lab
0
What is digital steganography?

What is digital steganography?

We all know what it means to “read between the lines” in a figurative sense, but before we used modern technology to communicate with one another, people sometimes took it literally, such as by writing secret messages in invisible ink between the lines of a seemingly normal letter.

The technique, whereby the author of a message hides secret information inside something that looks innocent on the surface, is known as steganography, and it is almost as old as writing itself. Unlike cryptography, which scrambles the message to make it unreadable without the decryption key, the purpose of steganography is to conceal from prying eyes the very existence of the...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 99

Transatlantic Cable podcast, episode 99

aS9SE08sb0ZD64XFSYGj7hx3whVzb6m3.jpg?s=9d324051a2ac124fe9db072db9836c7d

The 99th edition of the Kaspersky Transatlantic Cable podcast comes to you straight from the Motherland — er, Fatherland, as my colleagues have corrected me. Dave and I, reporting together from Russia, take a look at a handful of stories that will pique your interest and that you may have missed during your busy week.

To kick things off, we start in the good ol’ USA, where a second Florida city has paid for a ransomware attack. This trend of cities paying the crooks is worrying. From there, we head to a different kind of circus and and its app’s lack of a security protocol. The third story follows up on a security breach at the US border. Then, we...

Read more...
About Kaspersky Lab
0
Hacking our boss’s smart home

Hacking our boss’s smart home

The idea of a smart home is becoming more and more mainstream nowadays. Previously appealing mostly to geeks and people who always buy the newest toys, smart home setups have become quite popular, and a basic setup can even be affordable.

One of our colleagues joined the smart home party and added some fancy, techie things to his new home. After he installed everything, he thought researchers from Kaspersky ICS CERT might have some fun playing with his new toy. Of course, security researchers’ idea of a good time is trying to break new toys. And, of course, they thought it was a marvelous idea. And, of course, they succeeded. And so, of course, here is the...

Read more...
About Kaspersky Lab
0
Encrypted cities

Encrypted cities

The number of cyberattacks on US city administrations is on the rise. In less than two months, a third city suffers from the same threat — ransomware.

Baltimore, Maryland, was attacked on May 7. The city’s administration decided not to give in to the extortionists and suffered damages of more than $18 million, according to preliminary estimates. A few weeks later, Riviera Beach, Florida, was next. The city’s computers were encrypted, and officials decided to pay the extortionists 65 bitcoins, or about $600,000.

9Bq1o6ttMjuf53QoJPZPvkK92Th-RmAK.jpg?s=52eb875e95e672f1bbca423e3d6684f9

A week after that, another city in the same state was attacked — Lake City. This time, the city administration deliberated even less and ended up paying almost...

Read more...
About Kaspersky Lab
0
Sign In with Apple — quick login for privacy geeks

Sign In with Apple — quick login for privacy geeks

At its Worldwide Developer Conference earlier this June, Apple presented its new authentication system, Sign In with Apple, which lets users create new website and app accounts using their Apple ID. It’s supposed to be very simple: One click or a tap and you are signed in. According to the plan, the system is going to be tested this summer to become available to the general public toward year end.

The idea is not new: Facebook and Google have had a similar option for some years now. But the approach Apple chose differs fundamentally from those of its predecessors. Here’s why.

qRivMkrOfQiMbJuOCAze-CuFoh0GoSND.jpg?s=d5a5cf32eb3e864178c7290da27d6d90How does it work with Google and Facebook?

Many websites and...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 98

Transatlantic Cable podcast, episode 98

K0mwWGMeil9O9kjHIcG4kGRuGT_Fw7jX.jpg?s=ffc1ad1725df7bffba766521d0743877

For the 98th edition of the Kaspersky Transatlantic Cable podcast, Dave and I jump between the consumer and public sectors — from consumer cybersecurity to government-focused ransomware attacks.

To start things off, we dive into the world of music — for the second straight week. In this story, Genius.com says it has evidence of Google scraping its site for song lyrics. The devil’s in the (Morse code) details. After that, we look at a story about Instagram testing out new ways for users to recover their accounts following a hack.

The third story has us looking at the Internet of Things and Samsung’s message for users to run antivirus scans of their...

Read more...
About Kaspersky Lab
0
How to delete VKontakte (but keep your data)

How to delete VKontakte (but keep your data)

VKontakte is one of the most popular social networks in Russia. Although it’s less known outside the country, you may have signed up out of curiosity or to chat with Russian friends. But then perhaps your Russian pals got on Facebook and VKontakte became irrelevant. This post is about how to delete your redundant profile while keeping something to remember it by.

xQtRpFxJs5Wdq-A8MZQrCORX_BJjjZ6L.jpg?s=36b44a052e301ce7948b1fcdf517b632How to download data from VKontakte

Let’s start by preserving what’s accumulated in your VKontakte account. This is not as difficult as it may seem — if you ask nicely, VKontakte will send you an archive with your data. To do so, click the button at the bottom of this linked...

Read more...
About Kaspersky Lab
0
Dark web schooling

Dark web schooling

School exams not going quite according to plan? It can happen to anyone. Most of those affected will pick themselves up, retake the tests, or change their goals. But in a few cases, students may be tempted to cheat their way to success.

Over the years, an underground industry has grown up around that temptation, from discussion fora and how-to videos for hacking into your school system to fake certificates and diplomas available for sale on the black market. We decided to look into this a little and see what schools and colleges can do to protect themselves and their students.

sN1IBjxNP6A1LyYtwgjFprAuX5JSI3Zm.jpg?s=f450130775cd38220c3f76bf0803e45bGetting access to grades

Many schools have introduced Web-based information platforms for...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 97

Transatlantic Cable podcast, episode 97

Kvic_BXrtW9v7kWirkIdpS6UUKhi6BiT.png?s=26cdf26f1d1477138f3556031dc3d41c

The Transatlantic Cable podcast is nearing its hundredth episode — man, how time flies. For this week’s edition, Dave and I split our time between the consumer space and the legal world.

To start things off, we look at a newly placed FCC complaint against AT&T, T-Mobile, Sprint, and Verizon for selling customer data to third parties. This story ties to a past podcast topic — the location-based data that can help bounty hunters (or those with the money to spend) to track a user’s location.

From there, we jump into the story of a lawsuit against Amazon for an Alexa recording a child without consent. After that, we head over to the music world, where...

Read more...
About Kaspersky Lab
0
A photo editor with a difference

A photo editor with a difference

Whenever we discuss Android security, we always recommend downloading apps only from the Google Play Store, as it contains significantly fewer malicious apps than other such sites. Still, developers manage to sneak in malware every now and then. So, how do you avoid picking up something nasty when downloading apps from Google Play? Pay close attention to the permissions requested by the app, and think carefully about why the app needs those permissions before you give it the green (or red) light. Today’s post looks at that very issue: the danger posed by a Google Play app that demands seemingly unnecessary permissions.

8HEXidMSSKLW5VRZx95Hws6ORgn1avxk.jpg?s=2e296f7bb9011eaa8be174567b09dd75

Not long ago, we discovered a...

Read more...
About Kaspersky Lab
0
Miners in your office

Miners in your office

As you may have heard, mining on your own resources is not the most profitable business. It is risky to invest in home mining farms, and no one really wants to pay for the electricity. Therefore, mining adepts increasingly try to use someone else’s equipment for it.

0EQV0fdVaLn4AWHMRRbmwwM3ODuuKW4d.jpg?s=0e4cd13c712c648a913c48a5a47b1bc8
The damage from their actions is obvious. First, the equipment overheats, and therefore breaks down faster. Second, constant lags slow business processes. Finally, why should you pay someone else’s electricity bills?

Methods of mining on someone else’s equipment

Let’s leave aside for the moment extreme incidents such as the recent one in China in which a local resident laid a cable along the floor of...

Read more...
About Kaspersky Lab
0
Spammers are threatening companies’ websites

Spammers are threatening companies’ websites

Extortionists are constantly inventing new blackmail strategies. Until recently, their main trick was “sextortion,” which you may already have read about. However, as happens with most cyberthreats, criminals’ attention began to shift from users to organizations. That is not surprising — there is much more money in business.

iCiXzZLcO5u9qkEmktHwFWj1LffqTcjv.jpg?s=cc7cb49071a3f93171fc62569b27286f

Not long ago, our spam filters began catching a new version of blackmail letters. At this time, they threaten to undermine the reputation of the websites of small and medium-size companies. The scheme is quite simple: They send letters to victims’ public addresses (or submit them using their website “contact us” form),...

Read more...
About Kaspersky Lab
0
What is a hoax, where do hoaxes come from, and why are they dangerous?

What is a hoax, where do hoaxes come from, and why are they dangerous?

Kaspersky products characterize certain software as “Hoax.” Let’s investigate what this verdict means, in which cases our products deliver that verdict, and why users should beware of such programs.

uUSbnOaVPxAeYeahnlUSe7Dq7oAGBr4k.jpg?s=e1edc6e197871b607434e6b556b92bb3Astrologers announce the year of the Hoax: Detections double

The reason for this post is the increase in the number of detections our products have been making with the Hoax verdict. The number of users who have encountered such software has doubled in the past year. In short, more and more users are being caught in the risk zone. So it’s worth taking the time to dissect the problem, starting with a brief background...

Read more...
About Kaspersky Lab
0