Weaponized USB devices as an attack vector
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
3201 articles
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
This episode brings you stories of Amazon Alexa, a UK government BCC error, and so-called smart-car apps with hard-coded passwords.
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
A new APT attack targets the diplomatic mission of an Asian country.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
In this episode of the Kaspersky Lab podcast, Jeff and Ahmed take a look at the first day of the Security Analyst Summit in Singapore.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
In this episode of the Kaspersky Lab podcast, Dave and Jeff discuss the perils of downloading shows, like Game of Thrones, on torrents, Facebook calling for regulation, Toyota breaches, and more.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
Do you use plugins on your website? Make sure they are updated regularly.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.