Here’s the past week’s news in a way that’s fun, informative and educational – all in a tight, quarter-hour podcast format. (Plus – find out what Chester would do with the $1m!) Source: Sophos
Here’s the past week’s news in a way that’s fun, informative and educational – all in a tight, quarter-hour podcast format. (Plus – find out what Chester would do with the $1m!) Source: Sophos
Download PDF version Q3 events Of all the Q3 2015 events in the world of DDoS attacks and the tools used to launch them, we picked out those that, in our opinion, best illustrate the main trends behind the evolution of these threats. DDoS attacks targeting financial organizations for the purpose of extortion; new techniques […]
Download PDF version Q3 in figures According to KSN data, Kaspersky Lab solutions detected and repelled a total of 235,415,870 malicious attacks from online resources located all over the world. 75,408,543 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab’s web antivirus detected 38,233,047 unique malicious objects: scripts, exploits, executable files, etc. […]
“Ido, we will address this compromise with Miss. XXXX directly. Thank you for notifying us,” said the last email received from Miss. Patricia Falcon, Information Security Policy & Awareness Specialist at the University of Brown, Rhode Island. Suspected spear phishing campaign attempting to steal users’ credentials by sending phishing emails masquerading as Google recovery. From […]
In an earlier newsletter (March 2015), we talked about Macro viruses and that it was making a comeback. In it we stated that, “A macro virus is a computer virus that replaces a macro. A macro is basically a single instruction that expands automatically into a set of instructions to perform a particular task. In […]
In early October, it was announced that a critical vulnerability had been found in the libutils library. The libutils library is part of Android OS; it implements various primitive elements that can be used by other applications. The least harmful result that exploiting this vulnerability could lead to is the software that uses the stagefright […]