The complexities of public attribution
Credit to Author: Jeffrey Esposito| Date: Fri, 12 Apr 2019 15:51:15 +0000
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Jeffrey Esposito| Date: Fri, 12 Apr 2019 15:51:15 +0000
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
Read MoreCredit to Author: Jeffrey Esposito| Date: Wed, 10 Apr 2019 13:51:05 +0000
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
Read MoreCredit to Author: Kaspersky Team| Date: Wed, 10 Apr 2019 04:30:12 +0000
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
Read MoreCredit to Author: Marvin the Robot| Date: Tue, 09 Apr 2019 07:51:04 +0000
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Read MoreCredit to Author: Leonid Grustniy| Date: Fri, 05 Apr 2019 13:19:41 +0000
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 04 Apr 2019 15:22:49 +0000
In this episode of the Kaspersky Lab podcast, Dave and Jeff discuss the perils of downloading shows, like Game of Thrones, on torrents, Facebook calling for regulation, Toyota breaches, and more.
Read MoreCredit to Author: Marvin the Robot| Date: Mon, 01 Apr 2019 16:01:02 +0000
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
Read MoreCredit to Author: Marina Mash| Date: Thu, 28 Mar 2019 15:39:30 +0000
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Read More