[email protected] +603-2181 3666
Extol Threat Intelligent Notification

China continues to host the most powerful supercomputer in the world— with 93 petaflop/s (quadrillions of calculations per second), the Sunway TaihuLight displaces Tianhe-2, the other Chinese supercomputer that claimed the No. 1 spot on the past six TOP500 rankings. But there’s something else. This supercomputer monster is not only powerful but it is also […]

What separates Twitter commoners from Twitter royalty? A blue badge indicating who has a special account verified by Twitter. These users usually include the most searched and include celebrities and influencers. Only 187,000 of the 320 million monthly Twitter users are a part of this distinguished club. In addition to giving them a higher rank, […]

How Trojans manipulate Google Play
August 31, 2016

For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the trust of that audience and experiences a degree of leniency from the security systems built into operating systems. On mobile devices, users typically cannot install applications coming from sources other than […]

Passwords are omnipresent in our everyday lives. Over the years, they have changed and adapted to continue protecting the websites, applications, devices and other online services that we use daily. With cybercrime on the rise, it is becoming more important to use passwords that are tough enough to withstand increasing security measures. Experts recommend (and sometimes […]

The Hunt for Lurk
August 30, 2016

In early June, 2016, the Russian police arrested the alleged members of the criminal group known as Lurk. The police suspected Lurk of stealing nearly three billion rubles, using malicious software to systematically withdraw large sums of money from the accounts of commercial organizations, including banks. For Kaspersky Lab, these arrests marked the culmination of […]

Tales from Ransomwhere: Shadow Copies
August 26, 2016

Shadow Copies: Taking advantage of ransomware tricks There are not many ways to recover our kidnapped files from a ransomware attack without paying the ransom. If we are lucky (really lucky!) there might be some free tool to recover them, another option is to restore your files from your backup. However not everyone has a […]

1 59 60 61 62 63 157