Analysis

Trends and Analysis

Kaspersky DDoS Intelligence Report for Q4 2015

Q4 events Of all the Q4 2015 events in the world of DDoS attacks and the tools used to launch them, we picked out those...

BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents

Late last year, a wave of cyber-attacks hit several critical sectors in Ukraine. Widely discussed in the media, the attacks took advantage of known...

FBI Hackers Took Down A Child Porn Ring

How does the FBI crack down on child porn on Tor? By hacking, spying and conducting home raids. The FBI has...

The Asacub Trojan: from spyware to banking malware

We were recently analyzing a family of mobile banking Trojans called Trojan-Banker.AndroidOS.Asacub, and discovered that one of its C&C servers (used, in particular, by...

Targeted mobile implants in the age of cyber-espionage

Background When mass-produced electronic spying programs became widely known by the public, many email providers, businesses, and individuals started to use data encryption. Some of...

The mysterious case of CVE-2016-0034: the hunt for a Microsoft Silverlight...

Perhaps one of the most explosively discussed subjects of 2015 was the compromise and data dump of Hacking Team, the infamous Italian spyware company. For...

Microsoft Security Updates January 2016

с новым годом! Microsoft rings in the New Year with a new set of ten security bulletins MS16-001 through MS16-010, patching 24 CVE detailed vulnerabilities....

Malware on the Smart TV?

In a comment on Reddit this week, user “moeburn” raised the possibility of new malware circulating for Smart TVs: My sister got a virus on...