7.4 C
London
Friday, November 24, 2017
Home Tags Legitimate

Tag: legitimate

Android commercial spyware

Therersquo;s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools.
In reality, however, these apps barely differ from spyware, with the exception perhaps of the installation method.
Bots make up more than 75% of total traffic for some businesses, but one in three can't distinguish legitimate bots from malicious ones.
NY State Supreme Court: stingrays act as "an instrument of eavesdropping."
In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employeersquo;s home computer system.

To assist any independent investigators and all the people who have been asking us questions whether those allegations were true, we decided to conduct an internal investigation to attempt to answer a few questions we had related to the article and some others
Remote fault diagnostics, telematics and connected infotainment significantly enhance driver safety and enjoyment, but they also present new challenges for the automotive sector as they turn vehicles into prime targets for cyberattack.

The growing risk of a vehiclersquo;s systems being infiltrated or having its safety, privacy and financial elements violated, requires manufacturers to understand and apply IT security.

APT Trends report Q3 2017

Beginning in the second quarter of 2017, Kaspersky's Global Research and Analysis Team (GReAT) began publishing summaries of the quarter's private threat intelligence reports in an effort to make the public aware of what research we have been conducting.  This report serves as the next installment, focusing on important reports produced during Q3 of 2017.
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.
The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of hiding malicious code in the context of a trusted process.

Typically, malware that uses concealment techniques injects its code into a system process, e.g. explorer.exe.

But some samples employ other interesting methods. We're going to discuss one such type of malware.

DDoS attacks in Q3 2017

In the third quarter of 2017, we registered a considerable increase in the number of both DDoS attacks and their targets.

Traditionally, China is the country with the largest number of attack sources and targets.
It was followed by the United States and South Korea.

The popularity of Windows OS as a basis for creating a botnet has fallen noticeably, while the share of Linux-based botnets increased proportionally.
Forgeries undermine the trust millions of people place in digital certificates.
Millions of North Americans are using illegal TV services, research finds.
In September 2017, we discovered a new targeted attack on financial institutions.
Victims are mostly Russian banks but we also found infected organizations in Malaysia and Armenia.