Old-school exploits in a modern system
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
117 articles
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Should you contact authorities about ransomware?
The Galactic Empire’s heirs analyzed for cybersecurity.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
Why the computers in human resources are especially vulnerable, and how to protect them.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Security training aimed at IT teams, service desks, and other technically advanced staff.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
An integrated approach arms even small companies with automated tools that repel complex attacks.