Архив метки: Kaspersky

IT: Patch these critical new vulnerabilities in Windows, Adobe, and OS kernels

Автор: | 09.05.2018

On Tuesday, Microsoft issued patches for two vulnerabilities presently being leveraged by hackers. The most pressing of these—CVE-2018-8174—is a vulnerability in the VBScript engine, which can be exploited with relative ease in a Microsoft Office document that uses an ActiveX control, as well as Internet Explorer (IE) and any other software using the Trident rendering… Читать далее »

Why improved cybersecurity education can help reduce employee ‘cyber stress’

Автор: | 02.05.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: More than 30% of people do not trust social networking apps to protect their data and 29% do not trust mobile payment apps. People are becoming increasingly stressed by the need for security to protect their vital personal information. Stress permeates every aspect… Читать далее »

Major DDoS attack lasts 297 hours, as botnets bombard businesses

Автор: | 27.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: In Q1 2018, the longest DDoS attack lasted 297 hours, or more than 12 days. — Kaspersky Lab, 2018 DDoS botnets attacked online resources in 79 countries in Q1 2018. — Kaspersky Lab, 2018 Multi-day DDoS attacks are back again: In Q1 2018,… Читать далее »

Nearly half of UK manufacturers hit by cyber attacks

Автор: | 23.04.2018

Some 48% of UK manufacturers admit they have at some time been subject to a cyber security incident, with half of them suffering financial loss or disruption to business as a result, a survey shows. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and… Читать далее »

Business needs to keep up with Investigatory Powers Act

Автор: | 21.04.2018

In a recent High Court case regarding the Data Retention and Investigatory Powers Act 2014 (DRIPA), judges ruled that the government’s surveillance regime is unlawful. Although this judgement pertains to legislation that is no longer in force, it could have major implications for its successor, the Investigatory Powers Act 2016. By submitting your personal information,… Читать далее »

Top 5: Ways employees create security headaches for their companies

Автор: | 20.04.2018

According to a 2017 Kaspersky Lab survey, employees are responsible for 46% of IT security incidents. That’s good and bad news. The bad seems obvious. The good news is that you know where the problem is. So what are these human security holes doing? SEE: Why human vulnerabilities are more dangerous to your business than… Читать далее »

If you buy these tech accessories, you’re inviting hackers to take control of your car

Автор: | 19.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: Exploits for almost any connected car model can be found on the Dark Web. — Kaspersky Lab, 2018 Connected car owners should use only officials apps and accessories, update firmware regularly, and scan connected car mobile apps with antivirus to stay safe. —… Читать далее »

Why router-based attacks could be the next big trend in cybersecurity

Автор: | 17.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: The US and UK joint statement claims that Russian state-sponsored hackers are hacking routers to create man-in-the-middle scenarios for data harvesting. This is the latest of a string of reports over the last two months indicating that hackers are taking a particular interest… Читать далее »

AV-TEST reveals the best post-malware attack security tools

Автор: | 17.04.2018

Security suites worth their salt do not just prevent malware from gaining a foothold in computer operating systems and ancillary software—they offer the capability to remove malware that unfortunately made it past the suite’s perimeter defenses and (usually free) tools to clean and repair corrupted files, operating system or otherwise. The cat-and-mouse game between malware… Читать далее »

When hackers attack a country, they use the same flaws impacting your business

Автор: | 09.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: Hackers appear to be using a script to identify and break misconfigured Cisco switches located in Russia and Iran. One of the purported hackers cited «attacks from government-backed hackers» as motivation for their attack. Hackers have leveraged a recently disclosed vulnerability in Cisco… Читать далее »