English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1
Latest posting
By rating
By popularity

Join our blog

You can contribute to our blog if you have +100 points. Comment on articles and blogposts, and other users will rate your comments. You receive points for positive ratings.

Publications |Corporate threats in 2013 - the expert opinion

GReAT
Kaspersky Lab Expert
Posted December 05, 09:38  GMT
Tags: Social Engineering, Targeted Attacks, Vulnerabilities and exploits
0.2
 

Companies are increasingly falling victim to cyber-attacks. According to a recent survey conducted by Kaspersky Lab and B2B International, 9% of the organizations polled were the victims of targeted attacks - carefully planned activity aimed at infecting the network infrastructure of specific organization. The extensive use of digital devices in business has created ideal conditions for cyber-espionage and the deployment of malware capable of stealing corporate data.

The full report is available here.

Comment      Link

Publications |ZeuS – now packed as an antivirus update

Andrey Kostin
Kaspersky Lab Expert
Posted December 04, 08:16  GMT
Tags: Spam Letters, ZeuS, Phishing
0.1
 

Last week, Kaspersky Lab identified a mass mailing of phishing letters sent in the name of leading IT security providers. The messages we detected used the product and service names belonging to Kaspersky Lab, McAfee, ESET NOD32 and many others.

The text and general layout of each letter followed the same template; only the senders’ names and the IT security solutions mentioned in the text were different. In their messages, the cybercriminals invited the reader to install an important security update for his/her security solution to guarantee protection against a new piece of malware supposedly ravaging the web. To do so, the user simply needed to open the attached ZIP archive and launch the executable file in it. Not surprisingly, the writers urged their victims to act immediately rather than spend time thinking about who might be behind this sudden urgent letter.


One of the phishing messages

Publications |The Top 10 Security Stories of 2011

Costin Raiu
Kaspersky Lab Expert
Posted January 04, 09:08  GMT
Tags: Google, Adobe, Microsoft, Apple, RedHat, Comodo, Sony
0.2
 

As we turn the page to 2012, it makes sense to sit back and take a look at what happened during the past twelve months in the IT Security world. If we were to summarize the year in one word, I think it would probably be “explosive.” The multitude of incidents, stories, facts, new trends and intriguing actors is so big that it makes it very hard to crack into top 10 of security stories of 2011.
Follow me on Twitter
What I was aiming for with this list is to remember the stories that also indicate major trends or the emergence of major actors on the security scene. By looking at these stories, we can get an idea of what will happen in 2012.

Publications |Dark Market

Vicente Diaz
Kaspersky Lab Expert
Posted November 09, 12:16  GMT
Tags: Virus Writers Wars, DDoS, Cybercrime Legislation, Credit Cards, Vulnerabilities and exploits
0.3
 

Dark Market was one of the most famous underground forums ever, for several reasons. The most important one was that one of the administrators was an infiltrated FBI agent running a covert operation that ultimately lead to the arrest of 60 people worldwide. The forum was shut down in 2008, when Dark Market was probably the most important carding forum in the world.

Publications |And some thoughts on the anti-virus industry

Eugene
Kaspersky Lab Expert
Posted June 13, 13:29  GMT
Tags: Antivirus Technologies
0
 

I now travel a lot. Trips - mostly business - make up about half my life.
Conferences, exhibitions, meetings (with short stops at the seaside or ski resorts if I stop at all). And at these events I'm asked lots of different questions. Last year one of the most frequently asked questions was my opinion about Microsoft's anti-virus, and the changes it might cause in the anti-virus industry.

That question started me thinking about the situation on the anti-virus market - and here's the result

Comment      Link

Publications |War driving and trainspotting

Aleks
Kaspersky Lab Expert
Posted May 25, 13:09  GMT
Tags: Wardriving, Wi-Fi
0
 

War driving and trainspotting are two urban phenomena which don’t seem to have anything in common. Trainspotters can be found at stations, at engine depots, and alongside the rails themselves, noting down train and engine serial numbers. Trainspotting is most popular in the UK and the USA, although trainspotters can be found in other countries.

The point of this seemingly pointless hobby is to ‘spot’ and record the serial numbers of all engines (and, for the true enthusiast, carriages as well) currently in use. Trainspotters exchange information about routes among themselves, and trainspotting became something of a cult activity after the release of the film of the same name.

So what has this got to do with wardriving? At first glance, absolutely nothing. But while I was in London researching WiFi networks, I started to notice some similarities:

Trainspotters and wardrivers have the same goal: to collect the maximum amount of data possible, whether it’s access points or engine numbers.
They can both be found outside in any weather, at any time of the year.
They use the same tools: laptops, mobile phones and PDAs.

The only difference is that trainspotters tend to stay in one place, whereas wardrivers are in constant motion, trying to cover as big an area as possible.

While I was in London, I felt I had to go and pay my respects to these dedicated hobbyists, and travelled to the trainspotters’ Mecca: King’s Cross and St Pancras stations. The trainspotters quietly, concentratedly entered data into their PDAs, and my wardriving laptop hummed quietly in my backpack, constantly scanning the surrounding digital environment. A meeting of two very different, but very similar, worlds.

You can read more about my London wardriving here

Comment      Link

Publications |More IM, more IM malware?

David
Kaspersky Lab Expert
Posted October 10, 09:11  GMT
Tags: Instant Messengers
0
 

The use of malicious code tends to follow well-trodden channels: in other words, if software is widely used, then virus writers will focus their efforts on exploiting its vulnerabilites. A recent report suggests that the use of instant messaging will increase considerably in the next few years. We've already seen an increase in IM worms. If IDC is correct about the growth of IM, virus writers will almost certainly continue to target it further.

Comment      Link

Publications |Bozori: the first 'business worm'?

David
Kaspersky Lab Expert
Posted August 19, 12:57  GMT
Tags: Targeted Attacks, Bozori
0
 

The anatomy of the Bozori worm outbreaks that we've seen in the last day or so leads us to believe that we're witnessing the emergence of a new type of infection, what we're calling the 'business worm'.

Read the full story here

Comment      Link

Publications |Bagle.ax and Bagle.ay descriptions published

Yury
Kaspersky Lab Expert
Posted January 27, 13:41  GMT
Tags: Bagle
0
 

Full descriptions of Bagle.ax and Bagle.ay are now available.

Comment      Link