All posts

3885 articles

Multiple-ATM Attacks

With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.

A Disembodied Threat

One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.

Classified data and security

Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.