HackDig : Dig high-quality web security articles for hacker

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of
Publish At:2017-09-19 11:40 | Read:3393 | Comments:0 | Tags:Publications Antivirus Technologies Security technology Targ

False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Indeed, this is a very inconvenient matter that some developers tend to overlook (or try to solve with questionable methods) until there is a serious incident that could paralyze the work of their cus
Publish At:2017-05-13 11:15 | Read:3857 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Antivirus Testing false

The security is still secure

Recently WikiLeaks published a report that, among other things, claims to disclose tools and tactics employed by a state-sponsored organization to break into users’ computers and circumvent installed security solutions. The list of compromised security products includes dozens of vendors and relates to the whole cybersecurity industry. The published re
Publish At:2017-04-16 11:45 | Read:3549 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Antivirus Vulnerabiliti

How Security Products are Tested – Part 1

The demand for tests appeared almost simultaneously with the development of the first antivirus programs – in the mid-to-late 1990s. Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions with the help of self-made methodologies, and later an industry of specialized companies emerged with a more comp
Publish At:2017-02-27 10:55 | Read:2713 | Comments:0 | Tags:Analysis Publications Antivirus Technologies Antivirus Testi

Rocket AI and the next generation of AV software

The annual Conference on Artificial Intelligence and Neural Information Processing Systems (NIPS) was held in Barcelona on 5–10 December 2016. This is, most likely, one of the two most important conferences in the AI field. This year, 5,680 AI experts attended the conference (the second of these large conferences is known as ICML). This is not the first year
Publish At:2017-02-07 11:10 | Read:4248 | Comments:0 | Tags:Blog Opinions Antivirus Technologies machine learning

Lost in Translation, or the Peculiarities of Cybersecurity Tests

In the book The Hitchhiker’s Guide to the Galaxy there’s a character called the Babel fish, which is curiously able to translate into and from any language. Now, in the present-day world, the global cybersecurity industry speaks one language – English; however, sometimes you really do wish there was such a thing as a Babel fish to be able to help
Publish At:2016-11-21 11:32 | Read:4273 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Comparative Tests

Can an inevitable evil be conquered?

Scanning an object (a file or web resource) with an Internet security program essentially comes down to making a binary decision: dangerous or safe? An antivirus engine puts forward the hypothesis that an object is malicious and then checks whether this is true or not. Since there are, unfortunately, no perfect antivirus solutions, errors can occur. There ar
Publish At:2015-09-16 06:55 | Read:2703 | Comments:0 | Tags:Blog Opinions Antivirus Technologies Antivirus Updates

How to mitigate 85% of threats with only four strategies

The Australian Signals Directorate Top35 list of mitigation strategies shows us that at least 85% of intrusions could have been mitigated by following the top four mitigation strategies together. These are: application whitelisting, updating applications, updating operating systems and restricting administrative privileges. Kaspersky Lab has technologic
Publish At:2015-05-12 10:10 | Read:4039 | Comments:0 | Tags:Blog Software Antivirus Technologies


Share high-quality web security related articles with you:)


Tag Cloud