HEADLINES
Exposing ICS components to the Internet provides a lot of opportunities, but also many concerns around security.
Hi, what are you looking for?
Exposing ICS components to the Internet provides a lot of opportunities, but also many concerns around security.
The modus operandi of “Dropping Elephant” (also known as “Chinastrats”) is not sophisticated. The attackers rely heavily on social engineering and low-budget malware tools...
Imagine this situation: a bank discovers it has been attacked. But, strangely, no money has been stolen, and nothing seems to have been modified...
While observing the activity of several cybercriminal groups, Kaspersky Lab researchers have spotted unusual activity in a malicious script, on an infected website, which...
In the past year, over one-in-four young Internet users have lost their devices (17%) or had their devices stolen (13%), with a third losing...
One in ten (9%) quiz respondents didn’t think people outside of their friends list could be seeing their pages and posts, making it easy...
Advanced Persistent Threats (APTs) as they are now known will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to...
The Philippines also experienced a rapid rise in detected malware infections according to the latest security report from Kaspersky Lab. KSN reports for July,...
A research by Kaspersky Lab and B2B International shows that the overwhelming majority of people (87%) store important, confidential and sometimes irreplaceable information on...
In 2013, a hacker group known to Kaspersky Lab as “Wild Neutron” (and which is also known as “Jripbot” and “Morpho”) attacked several high...