Coming soon! hacker:HUNTER: Ha(ck)c1ne - Healthcare on the Edge | Official Teaser

Launching September 25th ||| While the world went into Lockdown, cybercriminals and black-hat hackers looked at the opportunities of the situation. Attacks on hospitals, health organizations and researchers went on a steep rise. This episode of hacker:HUNTER examines how healthcare was attacked during COVID - and how solidarity formed to fight back.

 

0.jpg
1
user32610: This is the best ever piece of writing. Thanks for sharing.
How to fight delayed phishing

How to fight delayed phishing

Phishing has long been a major attack vector on corporate networks. It’s no surprise, then, that everyone and everything, from e-mail providers to mail gateways and even browsers, use antiphishing filters and malicious address scanners. Therefore, cybercriminals are constantly inventing new, and refining old, circumvention methods. One such method is delayed phishing.

What is delayed phishing?

Delayed phishing is an attempt to lure a victim to a malicious or fake site using a technique known as Post-Delivery Weaponized URL. As the name suggests, the technique essentially replaces online content with a malicious version after the delivery of an e-mail linking...

Read more...
Life of the Kaspersky Lab
0
How identification, authentication, and authorization differ

How identification, authentication, and authorization differ

It happens to every one of us every day. We are constantly identified, authenticated, and authorized by various systems. And yet, many people confuse the meanings of these words, often using the terms identification or authorization when, in fact, they are talking about authentication.

That’s no big deal as long as it is just an everyday conversation and both sides understand what they are talking about. It is always better to know the meaning of the words you use, though, and sooner or later, you will run into a geek who will drive you crazy with clarifications, whether it’s authorization versus authentication, fewer or less,...

Read more...
Life of the Kaspersky Lab
0
The Martian landscapes of the Altai Mountains.

The Martian landscapes of the Altai Mountains.

The main course of our Altai-2020 expedition was of course the rafting down the river Katun. However, the various hors d’oeuvres before it were rather special too. The rafting main dish came after a good long steady mosey from the northeast to near where the river starts out up in the mountains. The route: along the R256 highway up to the village Kosh Agach, and from there it wasn’t much further as we were already high up in the mountains.

Approaching the riverhead, we took one look at the super-high level of the water of the river Chuya and realized a spot of rafting upon its rapids was out of the question. Boo! We’d be missing the Behemoth...

Read more...
Kaspersky On The Road Again
0
Transatlantic Cable podcast, episode 162

Transatlantic Cable podcast, episode 162

For the 162nd edition of the Transatlantic Cable podcast, Dave and Jeff take a break from the mike to welcome a special feature from our friends over at Tomorrow Unlocked. In this episode, Kaspersky security expert David Jacoby looks at the digitization of schooling for parents and educators during the COVID-19 global pandemic.

Digitization is transforming all facets of society, not just work environments. The pandemic is driving digitization at an astonishing speed, showing that there is still a lot more to be done. The field of education is mainly reactive; other industries develop new disruptive technologies that existing educational cultures...

Read more...
Life of the Kaspersky Lab
0
Home network monitoring with Kaspersky Security Cloud

Home network monitoring with Kaspersky Security Cloud

Getting connected has never been so easy. In the not-so-distant past, you might’ve needed technical certification to get a home Wi-Fi network up and running, but that hasn’t been the case for quite a few years. These days, home networking is practically plug-and-play.

Note that we haven’t mentioned security anywhere yet. Of course, any reader of this blog knows that’s a trap. The challenge of home and external networking is to get connected reliably and safely.

When it comes to home networking, we really don’t recommend skipping the few steps needed to get and stay connected in a safe, secure way. That means changing the default...

Read more...
Life of the Kaspersky Lab
0
Schrödinger’s kittens: How TikTok can help educate your kids

Schrödinger’s kittens: How TikTok can help educate your kids

At first glance, TikTok, the fun and fresh social media platform doesn’t seem to offer much beyond addictive dance videos and risky challenges, but TikTok does host educational content as well, with more added every day. You just need to know how to find it.

The search for knowledge — on TikTok?

Social media feeds don’t come together randomly; they’re based on users’ interests. If you keep liking funny cat videos, more of them will appear in your recommendations. It’s that simple.

You can find more practical kinds of content on TikTok, however. For example, teachers from early childhood to higher education, scientists of all...

Read more...
Life of the Kaspersky Lab
0
Transatlantic Cable podcast, episode 161

Transatlantic Cable podcast, episode 161

Episode 161 of the Kaspersky podcast kicks off with something that should have been left in the past: Zoom-bombing. Turns out it’s still very much a nuisance and is now being used to attack schools and lessons.

From there, Dave and Jeff look at how “three middle-aged Dutch hackers” managed to break into Donald Trump’s Twitter account back in 2016 (credential stuffing and poor password management). They’ve since handed details over to the relevant US authorities. Moving on, the pair looks at how Portland, Oregon, is trying to take on facial recognition by banning its use in both private and public institutions. To wrap up, they look at an...

Read more...
Life of the Kaspersky Lab
0

Dear Eugene,

Would you be so kind to add our website https://www.langhamhouseclose.com to the KSN please?

Best regards

LHC




Ask Eugene Kaspersky
1
harlan4096: Please send it to https://opentip.kaspersky.com/
Survey on industrial cybersecurity in 2020

Survey on industrial cybersecurity in 2020

Every security officer views remote connections to corporate systems as a potential threat. For infosec experts at industrial enterprises, and especially at critical infrastructure facilities, the threat feels very real.
Every security officer views remote connections to corporate systems as a potential threat. For infosec experts at industrial enterprises, and especially at critical infrastructure facilities, the threat feels very real.

You can’t blame them for being cautious. Industrial enterprises, for which downtime can mean damage in the millions of dollars, are tempting targets for cybercriminals of all stripes. Ransomware operators are...

Read more...
Life of the Kaspersky Lab
0
Altai-2020: Chulyshman -> Katu-Yarik -> Bashkaus.

Altai-2020: Chulyshman -> Katu-Yarik -> Bashkaus.

In this post there’ll be a lot more photos than there are words. First up – photos of the route to Chulyshman ->

WyphzB_42WijuFzM77YEabZsMEc0F2rw.jpg?s=5eed3909ede1ab70c64782ea863a8698

We got there in a small convoy of sturdy vehicles, supplied by the Altai-Guide tourist agency (which we helped with an expedition to Chukotka a while back; the stickers on the vehicles are those left over from then).

We turn into the Chulyshman valley…

The river was at low tide, but it was anything but calm ->

The views everywhere you look – oh my gracious!

The famed Chulyshman rapids:

Not that we’d be white-water rapid-riding here. This stretch is pro-level. Mere amateurs like us – who have a bit of a paddle once every...

Read more...
Kaspersky On The Road Again
0
Zerologon vulnerability threatens domain controllers

Zerologon vulnerability threatens domain controllers

On August’s Patch Tuesday, Microsoft closed several vulnerabilities, among them CVE-2020-1472. The Netlogon protocol vulnerability was assigned a “critical” severity level (its CVSS score was the maximum, 10.0). That it might pose a threat was never in doubt, but the other day, Secura researcher Tom Tervoort (who discovered it) published a detailed report explaining why the vulnerability, known as Zerologon, is so dangerous and how it can be used to hijack a domain controller.

What is Zerologon all about?

Essentially, CVE-2020-1472 is a result of a flaw in the Netlogon Remote Protocol cryptographic authentication scheme. The protocol...

Read more...
Life of the Kaspersky Lab
0
Ode to joy – on Lake Teletskoye.

Ode to joy – on Lake Teletskoye.

Lake Teletskoye fills you with rapturous joy. Its vastness, its fiord-like vistas, and of course Altai’s mysterious… vibes. Bit more info re these mysterious vibes, btw: They’re not only magically calming-soothing and encourage you to go full-on meditative “we’re-all-one, there’s-only-now”; for some reason they also… keep you from sleeping! I reckon it must be that the part of the brain that’s responsible for all the deep and philosophically pensive activity simply doesn’t permit the rest of brain any room to maneuver: it kinda just hogs all the resources, much like a very old computer antivirus ).

WCrORuPR7ZIjmq0fwvNHVJZNoOjIcRcX.jpg?s=d35ea54ee285e7e66b58ab682381058a

The lake was calm and even-surfaced when we were there,...

Read more...
Kaspersky On The Road Again
0
A modern take on the movie Hackers

A modern take on the movie Hackers

Several common misconceptions hinder the widespread adoption of cybersecurity culture. One myth — hackers are really smart, so it’s pointless to fight them —was popularized in particular by the movie Hackers, released exactly a quarter of a century ago. The movie gave rise to a set of clichés still employed by the film industry.

Indeed, the movie’s misfit heroes and their adversary, Plague, an infosec expert at Ellingson Mineral, are portrayed as highly intelligent geeks able to find and exploit vulnerabilities in any information system.

For example, the main character is equally at ease breaking into a school database and a cable operator’s network....

Read more...
Life of the Kaspersky Lab
0
Oh my, oh my: 24 days in Altai!

Oh my, oh my: 24 days in Altai!

I think I’ve mentioned in passing recently – perhaps more than once – that I took my annual summer vacation this year in Altai. But it’s mid-September already – and still no Altai series of pics and tales? Eh? But don’t worry, it’s on its way – coming up soon. The thing is, there are soooo many photos this year, and so much video too that needs professional digital editing. Still, I am today able to at least give you my traditional taster, aka, starter course, aka aperitif, as a warm-up…

First, I can tell you – no, repeat to you, since I’ve been to Altai before, and even wrote a travelogue-book about the experience – that Altai is one of the most magically...

Read more...
Kaspersky On The Road Again
0
Transatlantic Cable podcast, episode 160

Transatlantic Cable podcast, episode 160

We interrupt our regular Kaspersky Transatlantic Cable podcast programming for a look at a new documentary about the Kuril Islands.

The documentary, From Kurils with Love, is a new project from Kaspersky’s Tomorrow Unlocked that takes a look at the Kuril Islands. Check out the trailer here:

For this podcast, I sat down with my coworkers Alejandro Arango and Povel Torudd, who were on the expedition and were involved in the production of the documentary. During our 35-plus-minute conversation, we touched on everything from where the Kuril Islands are, and why they are important, to life on a boat with strangers, and what’s next for Kaspersky. For...

Read more...
Life of the Kaspersky Lab
0
First post-quarantine industrial.

First post-quarantine industrial.

A few days ago, a momentous, landmark event took place. It was in a seaside city – a ‘regular’ one, where it gets dark of a night (unlike others I can think of:) ->

tY4oHDVPxr_RrIJ3_5helYXL633I-vhu.jpg?s=8b5cb76950cf16d7754ac97e0d316fbf

The momentous event was – drum roll, cymbal…….. our first post-quarantine conference! In sunny ~Sochi!

And here’s my first post-quarantine event badge! ->

View this post on Instagram

Первый "пост-карантинный" бэджик! Причём с нашей конференции по промышленной кибербезопасности в Сочи. Считаю это – знак :) —8<— My first after-lockdown business badge. This one is from our recent conference on industrial cybersecurity in Sochi. I guess this is a sign :)

A...

Read more...
Kaspersky On The Road Again
0

Hi Eugene,
Greetings from Team RhymesLyrics. Hope all is well.

Pls. add our website 

https://rhymeslyrics.com
to KSN.

Thank you so much,
​Team RhymesLyrics.

 

Ask Eugene Kaspersky
2
RhymesLyrics: Dear MISTR, Please, can you suggest how much time it will take in the process. It is still showing the gray icon in google search. Regards, Team R...
What end-to-end encryption is, and why you need it

What end-to-end encryption is, and why you need it

In recent years, communications services ranging from WhatsApp to Zoom have announced their implementation of end-to-end encryption. What does that mean? Well, the idea of encryption is pretty straightforward: It turns data into something that cannot be read. But what does end-to-end mean? What are its pros and cons? Without getting into the underlying math and technical terms, we’ll explain it as simply as we can.

What end-to-end encryption is — and its alternatives

End-to-end encryption is the act of applying encryption to messages on one device such that only the device to which it is sent can decrypt it. The message travels all the...

Read more...
Life of the Kaspersky Lab
0
Transatlantic Cable podcast, episode 159

Transatlantic Cable podcast, episode 159

It is 2020, and an election year in the US, so Dave and I kick off this week’s Kaspersky Transatlantic Cable podcast by looking at Russian troll farms.

In this story, the FBI tipped off Facebook, which in turn took down a number of accounts tied to the Internet Research Agency. That may have stopped the accounts before the disinformation spice could flow. Staying in the land of fakeness, we jump from news to Amazon reviews. This deep dive from the media exposed some interesting things about product reviews on the e-commerce giant — in the UK, at least.

Our third story stays on the topic of things that aren’t real. Unlike politics and reviews, this...

Read more...
Life of the Kaspersky Lab
0
How invulnerable is Linux?

How invulnerable is Linux?

Linux is malware-free — or so many believed for many years. The delusion arose from three bases. First, Linux was a niche system, used far less commonly than Windows. Second, it was used mainly by IT pros, who are savvier than the average user. And third, given the specifics of the system architecture, malware would have to obtain root permissions somehow to cause damage, greatly complicating attacks.

However, times change, and nowadays, Linux-based systems are catching up with Windows in some areas, having long overtaken it in others. What’s more, many developers are trying to make their systems more end-user friendly by providing graphical shells and tools...

Read more...
Life of the Kaspersky Lab
0
Bomb threat spam

Bomb threat spam

In late August, our mail traps started picking up some unusual blackmail messages. In them, cybercriminals claim to have planted a tetryl-charged bomb somewhere in the recipient’s office and say it will be detonated unless a ransom is paid or if police activity is observed near the building.

In reality, of course, there is no bomb — it’s an empty threat mailed indiscriminately to companies of all sizes. Cybercriminals count on scaring the victim into a knee-jerk response, because with time to think, they will realize that paying ransom solves nothing — if there is a bomb in the building, it’s not going anywhere.

T9jS0trM-K4FvdwaF-YZ89NyIuu4_evX.png?s=d35e053b7b42ddb4a7ed316c0e6420cc

In terms of structure and delivery method, this type of...

Read more...
Life of the Kaspersky Lab
0
Murmansk: the sunny, windless resort!

Murmansk: the sunny, windless resort!

The other day – finally! – I was back on the road after a six-month hiatus. It wasn’t my usual globetrotting routine, but it was a trip away – on a plane. Up to Murmansk!

bEWiamaW-sxk2SfiGtlu0nGXLEPHxIE7.jpg?s=5d25c6477ea630786477e5a2c4c5e4bf

It was just a short trip (over a long weekend), whose main purpose was a spot of fishing in the Barents Sea. Actually (and just as I like it), there was another reason for the trip – a spot of business (discussing certain industrial cybersecurity projects). But enough about work already (more on the work topic in an upcoming post from Sochi); today – it’s all about the fishing!…

We flew (yes – it did all feel a bit alien after half a year!) into Murmansk in the dead of night, but...

Read more...
Kaspersky On The Road Again
0

Hello can someone add my website to KSN?
Link: https://www.taiwan-face-masks.com

​Thank you so much

Ask Eugene Kaspersky
3
MiStr: Resin2020, hello! I'll forward your request to Kaspersky Lab too.
The tracking pixel in service of cybercrime

The tracking pixel in service of cybercrime

Attackers tend to do painstaking groundwork to engineer business e-mail compromise attacks (BECs). When they pose as someone authorized to transfer funds or send confidential information, their messages need to look as close to legitimate as possible. Details matter.

We recently got our hands on an interesting example of an e-mail sent to a company employee in an attempt to start a conversation.

Nu5XJ8kA4tnpp3mXd0lUaUyWmYc6rEEI.jpg?s=530d3d3cb70c02cba4fece1cfd103b3a

The text is fairly cut and dried for the type of e-mail in question. The attacker makes it clear that the sender is in a meeting, so not available by other means of communication. They do that to discourage the recipient from checking if they are...

Read more...
Life of the Kaspersky Lab
0
Cybersecurity – the new dimension of automotive quality

Cybersecurity – the new dimension of automotive quality

Quite a lot of folks seem to think that the automobile of the 21st century is a mechanical device. Sure, it has added electronics for this and that, some more than others, but still, at the end of the day – it’s a work of mechanical engineering: chassis, engine, wheels, steering wheel, pedals… The electronics – ‘computers’ even – merely help all the mechanical stuff out. They must do – after all, dashboards these days are a sea of digital displays, with hardly any analog dials to be seen.

Well, let me tell you straight: it ain’t so!

A car today is basically a specialized computer – a ‘cyber-brain’, controlling the...

Read more...
Life of the Kaspersky Lab
0