Fake-processing ATM attack
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
1211 articles
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
Analysis shows that the attackers are particularly active during the holiday period.
Kaspersky Lab will be showcasing and offering beta version of Kaspersky Security integration with ConnectWise.
Forrester Research interviewed vendors and customers to evaluate top endpoint security providers.
Who is responsible when connected devices go on a crime spree?
Yet another example of an attack against an ATM: This time the cash machine itself is emulated.
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
To protect critical infrastructure, industrial facilities need a way to share information.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.