HackDig : Dig high-quality web security articles for hacker

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of
Publish At:2017-09-19 11:40 | Read:221 | Comments:0 | Tags:Publications Antivirus Technologies Security technology Targ

Connected Medicine and Its Diagnosis

Medical data is slowly but surely migrating from paper mediums to the digital infrastructure of medical institutions. Today, the data is “scattered” across databases, portals, medical equipment, etc. In some cases, the security of the network infrastructure of such organizations is neglected, and resources that process medical information are acc
Publish At:2017-09-13 08:00 | Read:218 | Comments:0 | Tags:Featured Publications infrastructure Internet of Things Secu

Steganography in contemporary cyberattacks

Steganography is the practice of sending data in a concealed format so the very fact of sending the data is disguised. The word steganography is a combination of the Greek words στεγανός (steganos), meaning “covered, concealed, or protected”, and γράφειν (graphein) meaning “writing”. Unlike cryptography, which conceals the cont
Publish At:2017-08-03 06:35 | Read:478 | Comments:0 | Tags:Publications APT Crypto steganography

KSN Report: Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware threat landscape by Kaspersky Lab experts. Thi
Publish At:2017-06-26 07:20 | Read:439 | Comments:0 | Tags:Featured Publications Encryption Financial malware Malware S

What Interests Children Online

Today’s children and teenagers are integrated into cyberspace so tightly that discussions on the outright prohibition of using devices with Internet connectivity are nonsensical. It is more reasonable to teach children how to behave themselves correctly online and lend support by protecting them against undesirable content. To solve these problems, man
Publish At:2017-06-01 10:55 | Read:913 | Comments:0 | Tags:Analysis Featured Publications Parental control Security tec

Dridex: A History of Evolution

The Dridex banking Trojan, which has become a major financial cyberthreat in the past years (in 2015, the damage done by the Trojan was estimated at over $40 million), stands apart from other malware because it has continually evolved and become more sophisticated since it made its first appearance in 2011. Dridex has been able to escape justice for so long
Publish At:2017-05-25 13:15 | Read:828 | Comments:0 | Tags:Analysis Publications Botnets Financial malware Malware Desc

Ztorg: money for infecting your smartphone

This research started when we discovered an infected Pokémon GO guide in Google Play. It was there for several weeks and was downloaded more than 500,000 times. We detected the malware as Trojan.AndroidOS.Ztorg.ad. After some searching, I found some other similar infected apps that were being distributed from the Google Play Store. The first of them, called
Publish At:2017-05-15 13:40 | Read:1283 | Comments:0 | Tags:Analysis Featured Publications advertisement Google Android

Exploits: how great is the threat?

How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represen
Publish At:2017-04-20 08:00 | Read:1031 | Comments:0 | Tags:Analysis Featured Publications Internal Threats Statistics V

The Mistakes of Smart Medicine

As numerous studies have shown, smart houses, smart cars, and smart cities are undeniably beneficial to people in everyday life, but quite often can become a threat to their safety. It is not only a matter of personal data leakage. Just imagine that, for example, a smart refrigerator, affected by a third party at one point or another, would begin identifying
Publish At:2017-03-30 14:35 | Read:838 | Comments:0 | Tags:Analysis Featured Publications infrastructure Internet of Th

Threat Landscape for Industrial Automation Systems, H2 2016

The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was
Publish At:2017-03-28 07:05 | Read:778 | Comments:0 | Tags:Analysis Featured Publications ICS Industrial control system

The cost of launching a DDoS attack

A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal. The motives behind such attacks can vary – from cyber-hooliganism to extortion. There have been cases where criminal groups have threatened their victims with a DDoS attack unless the latter paid 5 bitcoins (more than $5,000). Often, a DDoS attack is
Publish At:2017-03-23 16:35 | Read:857 | Comments:0 | Tags:Analysis Featured Publications Botnets DDoS-attacks DDOS

How Security Products are Tested – Part 1

The demand for tests appeared almost simultaneously with the development of the first antivirus programs – in the mid-to-late 1990s. Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions with the help of self-made methodologies, and later an industry of specialized companies emerged with a more comp
Publish At:2017-02-27 10:55 | Read:967 | Comments:0 | Tags:Analysis Publications Antivirus Technologies Antivirus Testi

Financial cyberthreats in 2016

In 2016 we continued our in-depth research into the financial cyberthreat landscape. We’ve noticed over the last few years that large financial cybercriminal groups have started to concentrate their efforts on targeting large organizations – such as banks, payment processing systems, retailers, hotels and other businesses where POS terminals are widely
Publish At:2017-02-22 06:30 | Read:1482 | Comments:0 | Tags:Analysis Featured Publications Financial malware Google Andr

Mobile apps and stealing a connected car

The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimedia systems (music, maps, and films are available on-board in modern luxury cars) but also car key systems in both literal and figurative senses. By using proprietary mobile apps, it is possible
Publish At:2017-02-16 21:30 | Read:1143 | Comments:0 | Tags:Analysis Publications connected car Internet of Things Mobil

A look into the Russian-speaking ransomware ecosystem

It is no secret that encryption ransomware is one of the key malware problems today, for both consumers and corporate users. While analyzing the attack statistics for 2016, we discovered that by the end of the year a regular user was attacked with encryption ransomware on average every 10 seconds, with an organization somewhere in the world hit around every
Publish At:2017-02-14 09:15 | Read:1535 | Comments:0 | Tags:Analysis Featured Publications Crypto Malware Statistics Ran

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud