17.6 C
London
Tuesday, September 26, 2017
Home Tags Hide

Tag: Hide

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code.

At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform.
Malware scanners fail to detect 50 apps that charged for fake services.
Hackers continue to develop new ways to break into systems. Here are three of them, along with ways to fight back.
Malware depends on these four basic techniques to avoid detection.
If the mere idea of talking in public makes you want to hide in a bathroom stall with a stuffed bobcat, think again.
During the preparation of the “IT threat evolution Q2 2017rdquo; report I found several common Trojans that were stealing money from users using WAP-billing. We hadnrsquo;t seen any Trojans like this in a while, but several of them appeared out of nowhere. Most of them had been under development since the end of 2016 / the beginning of 2017, but their prevalence increased only in the second half of Q2 2017.

Therefore, I decided to take a closer look at these Trojans.
According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world.
Fatal error leaves customers scrambling for fixes that can take a week or longer.
Changing temps may have impacted the ability to farm, leading to new economic strategies.
Hackers are increasingly using Secure Sockets Layer encryption to conceal device infections, shroud data exfiltration and hide botnet communications, according to cloud security company Zscaler.