Home Tags Reverse Engineering

Tag: Reverse Engineering

Top 8 Reasons You Don’t Want to Miss SAS 2017

The planning for Kaspersky Lab Security Analyst Summit (SAS 2017) is nearing completion and we have a small number of invitations available for malware...

Dissecting Malware

Four-day course on reverse engineering There are just a handful of reverse engineers clustered at the very top of the information security profession.From March 30...

Mobile apps and stealing a connected car

The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years.The case in...

Nicolas Brulez on Malware Reverse Engineering Tips and Tricks

Kaspersky Lab Principal Security Researcher Nico Brulez talks with Ryan Naraine about his upcoming SAS 2017 training on the ins and outs of malware...

Hacking Group 'ShadowBrokers' Release NSA Exploits, Then Go Dark

The hacker group "ShadowBrokers" releases 61 files said to contain exploit tools used by the National Security Agency, which could fuel a race between...

How to hunt for rare malware

At SAS 2017, on April 1st and 2nd on St. Maarten, Global Director of GReAT Costin Raiu and Principal Security Researchers Vitaly Kamluk and...

Threat Actors Bring Ransomware To Industrial Sector With New Version of...

Disk-erasing malware has been tweaked to encrypt data instead and to ask for a Bitcoin payment. In an ominous but unsurprising development, threat actors appear...

This is your captain speaking… or is it?

In-flight entertainment systems create hacker risk, say researchers Vulnerabilities in Panasonic in-flight entertainment systems create a possible mechanism for attackers to control in-flight displays, PA...

Brute-Force Botnet Attacks Now Elude Volumetric Detection

It just became harder to distinguish bot behavior from human behavior. Inbar Raz, Principal Researcher, PerimeterX, also contributed to this commentary. Ask just about anyone the...

Fatal flaws in ten pacemakers make for Denial of Life attacks

Brit/Belgian research team decipher signals and devise wounding wireless attacks A global research team has hacked 10 different types of implantable medical devices and pacemakers...

More Androids carry phone-home firmware

Backdoor slipped into phones sold outside China doesn't even hide itself successfully Got a cheap-and-cheerful Android phone from BLU, Infinix, Doogee, Leagoo, IKU, Beeline or...

Shhh! Shazam is always listening – even when it’s been switched...

But it's totally benign, say developers A security researcher has discovered that when the Mac version of Shazam is switched off, it simply stops processing...