Books on cybersecurity: 5+ recommendations from our experts
We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.
1211 articles
We recently approached our experts and asked which books they would recommend for would-be malware analysts. Here is their list.
Windows XP’s longevity is fascinating – and terrifying from the security point of view. The latest survey shows it’s still around – over 16% of KSN users still use Windows XP, but it is also clear that its epoch is near the end.
A recent survey shows that IT professionals have a very uneven understanding of how to protect their virtualization environments. Baseline awareness exists, but there’s a Roman Colosseum of room for improvement.
High-tech crime sounds impressive, but actually the tools are the only somewhat high-tech part, the goals almost never are.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
According to a recent Kaspersky Lab and B2B International survey, 21% manufacturing businesses lost their intellectual property to security breaches. In most cases malware was the cause, although other problems were named.
Four years after the discovery of the Stuxnet worm, the primary vulnerability it had been exploiting is still around. This is mainly the problem of poorly maintained Windows XP PCs and servers, most likely inhabited by worms. In the interconnected world a neglected PC or a server is a possible problem for many people.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
Few companies are interested in protecting their users’ endpoint devices, even though it’s one of the most vulnerable points in the financial transaction chain. At the same time, users expect payment operators to reimburse their funds in instances of successful fraud.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.
Kaspersky Lab has released a new IT Security Risks Survey, conducted in 2013-2014 together with B2B International. Facts and figures show that security situations in businesses improved very little, if at all. Small and mid-sized businesses still have their IT strategy low on their priorities list.
Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
A visual representation of a problem appears just a bit more meaningful, and at the same time more comprehensible, than large sheets of texts. Here is a big (or not so big) picture of threats to medium-sized businesses.
Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
As a security vendor, we at Kaspersky Lab have to foresee possible problems stemming from essentially good things. Serious transformations in the software market bring both new advantages, but also new problems and challenges, to which we need to pay attention.
The same code base of Windows for various devices means also that the same malware can hypothetically attack all of them.
Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.