Security Week 39: XcodeGhost, the leak of D-Link certificates, $1M for bugs in iOS9
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
412 articles
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
If the idea of “hacking-back” against cybercriminals who have harmed you or your company has seized you, your executive team, or your spouse as a reasonable thing to do, read
Kaspersky Lab, together with B2B International, has conducted a new survey of IT security risks.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term “RAT” is usually associated with the software used for criminal or malicious purposes.
A look at what the “threat landscape” is comprised of for businesses.
It’s not feasible to call a security solution, either for individual users or for businesses, “an antivirus.” There’s more than that.
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Simda was a rather mysterious botnet that had been used for dissemination of third-party potentially unwanted and malicious software. It has a built-in tools to detect and evade emulation, virtual machines and security tools, effectively allowing the bot to stay out of grid – apparently for years.
A new, Chinese-language APT has emerged, seeking geopolitical information and targeting nations in and around the South China Sea
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
Over the last few years we have witnessed a number of high-profile, large scale security breaches with quite dramatic consequences, such as massive leaks of personally identifiable data.
Phishing used to be an exotic threat, but that was years ago when malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard – especially