Unlock your creativity!

We run online contest with $5000 prize fund!

The goal of this online contest is to gather ideas about how to explain to businesses the dangers they may face when they re-open their physical premises – and what they can do to avoid them. We at Kaspersky and The Community Creatives believe that this is a good opportunity to make a change in the attitude of businesses to their information security practices, which may affect their customers, including you and us. We invite all of the creative professionals and amateurs to join us in our quest to make the world safer – and better.

Read more and register here:
 

T6vaLMN0JzoPookPlUK0P2yyok5gTKNa.png?w=270&s=d44d90ad1b056bade43161ac54218702Unlock your creativity: “Getting back to business cyber-safely” Ideathon...
Read more...
4
peikai: Doesn't work
How to share subscriptions without tears

How to share subscriptions without tears

The digital world is made up of services. Services are available by subscription. Subscriptions are linked to accounts. But not everyone wants to sign up and pay for a bunch of subscriptions, especially if they can borrow a friend’s or relative’s account. Or can they? Let’s dive in to learn about who you can “lend” content to in popular services and on what terms. And what will happen if you try to bend the rules.

Read more...
About Kaspersky Lab
0
Never trust, always verify: The Zero Trust security model

Never trust, always verify: The Zero Trust security model

The Zero Trust model has been gaining popularity among organizations in recent years. According to 2019 data, 78% of information security teams had implemented this model or at least were planning to make the move. Here, we break down the Zero Trust concept to see what makes it attractive for business.

The perimeter is no more

Perimeter security, a common term in corporate infrastructure protection, encapsulates the use of thorough checks for any and all attempts to connect to corporate resources from outside that infrastructure. Essentially, it establishes a border between the corporate network and the rest of the world. Inside...

Read more...
About Kaspersky Lab
0
Analysis of WastedLocker targeted ransomware

Analysis of WastedLocker targeted ransomware

In late July 2020, tech news sites were brimming with articles about Garmin. Various Garmin services, including device syncing with the cloud and tools for pilots, were disabled. The dearth of accurate information left everyone theorizing wildly. For our part, we decided to wait for some concrete data before assessing the situation.

In its official statement, Garmin confirmed that it had been hit by a cyberattack that interrupted online services and encrypted some internal systems. The information available at the time of this writing indicates that the attackers used the WastedLocker ransomware. Our experts performed a detailed technical...

Read more...
About Kaspersky Lab
0
Speedrunning world record secured

Speedrunning world record secured

Speedrunner Xiae just broke a world record, rushing through Doom Eternal in 1 hour, 8 minutes and 52 seconds.

What is speedrunning (and why is performance important for it)?

People who have beaten a single-player game at its highest difficulty level sometimes move on to speed runs, competing to finish the entire game — from the very beginning to the very end — faster than anyone else.

Speedrunners in action can be a ton of fun to watch. Some seek out glitches in the game to minimize their time, while others prefer sticking to the rules, still managing to finish games faster than an average player can complete just the first level. For example, Doom...

Read more...
About Kaspersky Lab
0
Transatlantic Cable podcast, episode 153

Transatlantic Cable podcast, episode 153

To start episode 153 of the Kaspersky Transatlantic Cable podcast, Dave and Jeff look back on four years of the No More Ransom initiative, of which Kaspersky is one of the four founding members. In its first four years, the project has helped millions of people get their files back without paying ransomware fees.

From there, they look at how the recent Garmin ransomware incident has affected flying thanks to flyGarmin being knocked offline during the attack.

They also look at how the US government is trying (once again) to add backdoors that will allow law enforcement agencies to sneak into encrypted messages and traffic.

To wrap up, they look...

Read more...
About Kaspersky Lab
0
Lazarus experiments with new ransomware

Lazarus experiments with new ransomware

The Lazarus group has always stood out for using methods typical of APT attacks but specializing in financial cybercrime. Recently, our experts detected fresh, previously unexplored VHD malware, which Lazarus seems to be experimenting with.

Functionally, VHD is a fairly standard ransomware tool. It creeps through the drives connected to a victim’s computer, encrypts files, and deletes all System Volume Information folders (thereby sabotaging System Restore attempts in Windows). What’s more, it can suspend processes that could potentially protect important files from modification (such as Microsoft Exchange or SQL Server).

But what’s really...

Read more...
About Kaspersky Lab
0
What is Kaspersky Internet Security, FAQ

What is Kaspersky Internet Security, FAQ (by @Danila T.)

Kaspersky Internet Security is a solution for protecting devices from a range of digital threats. It secures your online payments and protects against online fraud, viruses and data leaks. You can manage the protection of your devices remotely through the account at My Kaspersky.

Kaspersky Internet Security has versions for Windows, macOS, and Android.

You can always download the latest versions of the Kaspersky products from Here


Knowledge Base Product Kaspersky Internet Security is here: https://support.kaspersky.com/kis20
 

Product support
0
Kaspersky Internet Security - Notification of Detection, file or website detected

Notification of Detection, file or website detected (by richbuff (Richard Buffalin))

File or website detected, checklist:

Kaspersky Settings > Additional > Threats and exclusions > Detection types > enable Detect Other Software.
and do a databases update > reboot, then do a scan.

Clear the contents of your Temp folder, instructions: http://support.kaspersky.com/1161 and then reboot.

After that, uninstall any recently installed junk > reboot.

After that, uninstall any and all junk toolbars > reboot.

Uninstall/disable any and all junk browser add-ons and extensions and plugins in all of your browsers.

Remove the junk argument from the target field of the browser shortcut properties.

Remove...

Read more...
Product support
0
Kaspersky Internet Security - Update Issues checklist

Update Issues checklist ( by richbuff (Richard Buffalin))

How do you connect to the internet? Is your internet connection ok? Is your internet connection metered?
Have you waited 15 minutes after system boot up to see if the update will occur?

Reboot, then check system date/time correct, then Settings > Additional > Network > Proxy server > select Do Not use proxy server.

Are you on battery or main power? Settings > Performance > uncheck Disable scheduled tasks.

Are you in Gaming Profile? Kaspersky Settings > Performance > uncheck Automatically disable some functionality when in full screen mode.

Is your Kaspersky license expiring in a few days?

If your license is a managed subscription,...

Read more...
Product support
0
Five regular checks for SMBs

Five regular checks for SMBs

It is not always economically viable for small and medium-size businesses to maintain a dedicated IT security team, so it often happens that one person is in charge of monitoring the entire infrastructure. Sometimes he or she is not even a permanent, full-time employee.

Sure, a good administrator can do a lot, but even a pro might miss something, particularly if issues are mounting and time is short. So, it’s worth establishing a few habits. Here are our Top 5 regular checks.

Renew the corporate site security certificate

Any website that requests or processes user data must have an SSL certificate. It protects information entered by visitors from being...

Read more...
About Kaspersky Lab
0
Virtual Preview: Black Hat 2020

Virtual Preview: Black Hat 2020

Let’s be honest: No one, and I mean no one, could have predicted 2020’s particular challenges. If you know anyone who says they knew it would all go down like this, please send them my way — I have a special present for them.

The vast majority of the population has had to make major changes to the way they live and work. Few were at all prepared for so many people to be working from home, needing to wear masks outside of the home, and lots more. With that said, one group seems almost immune to the pandemic and the changes surrounding it: cybercriminals.

Read more...
About Kaspersky Lab
0
Five regular checks for Android

Five regular checks for Android

For many, life revolves around the smartphone. One particularly innovative guy even married his “digital companion.” Even if your life is balanced differently, it’s safe to say your phone contains a huge amount of personal data and valuable stuff — from photos to games, from contacts to music, and so on.

To make sure that you remain in control of your data wealth, some regular maintenance is required — think of it like brushing your teeth, only it’s your phone you need to clean. In this post, we talk about five regular safety and security checks for Android smartphones.

1. Check apps

Start with the list of installed apps. Go through it, ruthlessly deleting...

Read more...
About Kaspersky Lab
0
How to stay sane when you’re working from home in semipermanent semiquarantine

How to stay sane when you’re working from home in semipermanent semiquarantine

In spring, when much of the world went into lockdown, many of us thought that after a month or two of sitting at home, life would return to normal. A month or two passed, then a third and a fourth, but still normality is nowhere on the horizon.

Sure, many businesses have now reopened, but we are still cautious about crowded rooms; many offices and other premises are still closed; and few are willing to take a plane or even train. Some are working from home, and some are unfortunately out of work.

Of course, we still hope the dark clouds will soon pass. An effective vaccine, collective immunity, advances in...

Read more...
About Kaspersky Lab
0
An early-warning system for cyber-rangers (aka – Adaptive Anomaly Control).

An early-warning system for cyber-rangers (aka – Adaptive Anomaly Control).

Most probably, if you’re normally office-based, your office right now is still rather – or completely – empty, just like ours. At our HQ the only folks you’ll see are the occasional security guards, and the only noise you’ll hear is the hum of the cooling systems of our heavily-loaded servers given that everyone’s hooked up and working from home.

You’d never imagine that, unseen, our technologies, experts and products are working 24/7 protecting the cyberworld. But they are. But the bad guys are up to new nasty tricks at the same time. Just as well, then, that we have an early-warning system in our...

Read more...
On The Road Again
0
Transatlantic Cable podcast, episode 152

Transatlantic Cable podcast, episode 152

To start the 152nd episode of the Kaspersky Transatlantic Cable podcast, Dave and I talk about a new threat to fast charging devices. The BadPower attack sees firmware of fast charging devices altered in a manner that literally fries the devices using it.

From there, we head into legal affairs, with the hacking of the Ripoff Report as well as the legal issues that the hacker faces in the States.

The third story of the pod jumps into the future of the World Wide Web: China is proposing some major changes for the Internet.

We then sit down with Maria Namestnikova of our Global Research and Analysis Team (GReAT) to discuss parenting in COVID-19...

Read more...
About Kaspersky Lab
0
MATA: A multiplatform malware framework

MATA: A multiplatform malware framework

The cybercriminal tool set is constantly evolving. The latest example: the malicious MATA framework our experts recently uncovered. Cybercriminals were using it to attack corporate infrastructures around the world. It can work under various operating systems, and it boasts a wide range of malicious tools.

Potentially, malefactors can use MATA for a wide variety of criminal purposes. However, in the cases we analyzed, the cybercriminals were attempting to find and steal data from client databases in victims’ infrastructure. In at least one case, they also used MATA to spread ransomware (our experts promise a separate study of that incident).

The...

Read more...
About Kaspersky Lab
0
Never trust, always verify: The Zero Trust security model

Never trust, always verify: The Zero Trust security model

The Zero Trust model has been gaining popularity among organizations in recent years. According to 2019 data, 78% of information security teams had implemented this model or at least were planning to make the move. Here, we break down the Zero Trust concept to see what makes it attractive for business.

The perimeter is no more

Perimeter security, a common term in corporate infrastructure protection, encapsulates the use of thorough checks for any and all attempts to connect to corporate resources from outside that infrastructure. Essentially, it establishes a border between the corporate network and the rest of the world. Inside...

Read more...
About Kaspersky Lab
0
Kaspersky VPN Secure Connection update

Kaspersky VPN Secure Connection update

One important change in everyone’s lives since we all got online around the turn of the century is that now, most of us move in and among a variety of wireless networks every single day. We’re not just at home, with the networks we secured properly; we’re at work, at the doctor’s office, at the kids’ schools, at a friend’s house. Even in the supermarket, our phones tend to find at least one public Wi-Fi network.

Of course, anyone concerned about privacy and security has at least considered using a virtual private network, or VPN. A VPN walls off your activity — from the thieves trying to get between you and your bank account and the advertisers that...

Read more...
About Kaspersky Lab
0

Hello, Dear My pc was infected by virus attack..... Virus name(.moba file).
My all data is encrypted..All data files type changed to moba file...please help me... I Searched on youtube and google...But Not found solution of this virus... 
                       

Product support
0

Comment supprimer .moba file virus et récupérer des fichiers cryptés

Product support
1
DonKid: Please, see these sites: https://id-ransomware.malwarehunterteam.com/ https://www.nomoreransom.org/en/decryption-tools.html https://noransom.kasper...
What spam does Eugene Kaspersky get?

What spam does Eugene Kaspersky get?

We all get masses of spam in our personal and work inboxes every single day. It ranges from harmless invitations to conferences we’ll never attend and ads for goods and services to not-so-harmless fake messages about winning a lottery or requests for help, usually in the form of a money transfer. Spammers write to everyone: students, housewives, CEOs.

We decided to take a look at what finds its way into the mailbox of the head of Kaspersky, and how the spam in his mail differs from the average. Of course, Eugene himself never sees most of these messages — they are automatically sent to the trash.

Some stats

We divided the spam in Eugene’s mailbox into...

Read more...
About Kaspersky Lab
0
Cyber-yesteryear, pt. 8: 1998-2000 (three firsts: restructuring, overseas office, partner conference).

Cyber-yesteryear, pt. 8: 1998-2000 (three firsts: restructuring, overseas office, partner conference).

The first few years after the founding of the company were the toughest of all because we really had to put the hours in, aka, bust our asses. It was like we were compressing a spring for it only later to be released to take the company up high and far beyond the horizon and in the right direction of pipe dreams (be careful what you have pipe dreams of:). After the formal registration of KL in 1997, with very little we did an awful lot. We had no money and hardly any resources, but the cybersecurity conveyor waits for no one: new technologies were needed, and the market demanded new...

Read more...
On The Road Again
0
Transatlantic Cable podcast, episode 151

Transatlantic Cable podcast, episode 151

Dave and I kick off this week’s edition of the Kaspersky Transatlantic Cable podcast with a look at the conviction of the LinkedIn hacker. We talk a lot on this podcast about data breaches and hacking, but that story was a bit of nostalgia.

From there, we hit on a pair of stories about TikTok. The first story is the one that will make you go hmmm. Recently, both the Republican and Democratic national committees in the United States have advised their members to delete TikTok from their devices and to avoid using it because of “security concerns” — or, if you read between the lines, because it’s from China. Staying on the TikTok topic, we talk...

Read more...
About Kaspersky Lab
0
Playing hide and seek catch – with fileless malware.

Playing hide and seek catch – with fileless malware.

Malicious code… – it gets everywhere…

It’s a bit like a gas, which will always fill the space it finds itself in – only different: it will always get through ‘holes’ (vulnerabilities) in a computer system. So our job (rather – one of them) is to find such holes and bung them up. Our goal is to do this proactively; that is, before malware has discovered them yet. And if it does find holes – we’re waiting, ready to zap it.

In fact it’s proactive protection and the ability to foresee the actions of attackers and create a barrier in advance that distinguishes genuinely excellent, hi-tech cybersecurity from marketing BS.

Here today I want...

Read more...
On The Road Again
0
CVE-2020-1350: Vulnerability in Windows DNS servers

CVE-2020-1350: Vulnerability in Windows DNS servers

Microsoft has reported the vulnerability CVE-2020-1350 in Windows DNS server. Bad news: The vulnerability scored 10 on the CVSS scale, which means it’s critical. Good news: Cybercriminals can exploit it only if the system is running in DNS server mode; in other words, the number of potentially vulnerable computers is relatively small. Moreover, the company has already released patches and a workaround.

What is the vulnerability, and how is it dangerous?

CVE-2020-1350 lets a malefactor force DNS servers running Windows Server to execute malicious code remotely. In other words, the vulnerability belongs to the RCE class. To exploit...

Read more...
About Kaspersky Lab
0