Senators want warrant protections for US email stored overseas

May 26, 2016 Tech Guru 0

A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country’s residents when they are stored overseas. The International Communications Privacy Act, introduced Wednesday by three senators, would close a loophole that allows law enforcement agencies to request emails and […]

CVE-2015-2545: overview of current threats

May 25, 2016 IvoryMcCauley 0

CVE-2015-2545 is a vulnerability discovered in 2015 and corrected with Microsoft’s update MS15-099. The vulnerability affects Microsoft Office versions 2007 SP3, 2010 SP2, 2013 SP1 and 2013 RT SP1. The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and […]

US agency releases privacy 'best practices' for drone use

May 20, 2016 Tech Guru 0

The National Telecommunications & Information Administration released Thursday a list of voluntary privacy best practices for commercial and non-commercial drone users, in the wake of concerns that drones could encroach on individual privacy and open a new front in the collection of personal data for commercial use. The privacy guidance, […]

Google challenges French fine for not being forgetful enough

May 19, 2016 Tech Guru 0

Google is appealing a fine from the French data protection authority for failing to implement the so-called right to be forgotten as ordered. The Court of Justice of the European Union established the right to be forgotten, or delisted, in May 2014. The ruling allows people to ask search engines […]

ATM infector

May 17, 2016 IvoryMcCauley 0

Seven years ago, in 2009, we saw a completely new type of attack on banks. Instead of infecting the computers of thousands of users worldwide, criminals went directly after the ATM itself – infecting it with malware called Skimer. Seven years later, our Global Research and Analysis Team together with […]

The Rio Olympics: Scammers Already Competing

May 16, 2016 IvoryMcCauley 0

A few years ago, spammers and scammers were not as interested in the Olympics as they were in football (the World Cup and European Championships). The first major increase in the number of spam messages devoted to the Olympic Games occurred in the run-up to the Winter Olympics in Sochi […]

Senators will introduce a bill to limit government hacking warrants

May 13, 2016 Tech Guru 0

A U.S. senator will introduce legislation to roll back new court rules that allow judges to give law enforcement agencies the authority to remotely hack computers. Senator Ron Wyden, an Oregon Democrat, will introduce a bill that would reverse a court procedure rules change, approved by the U.S. Supreme Court last month, […]

Spam and phishing in Q1 2016

May 12, 2016 IvoryMcCauley 0

Spam: features of the quarter Trending: dramatic increase in volume of malicious spam The first quarter of 2016 saw a dramatic increase in the number of unsolicited emails containing malicious attachments. Over the last two years the number of email antivirus detections on computers with a Kaspersky Lab product installed […]

Results of PoC Publishing

May 11, 2016 IvoryMcCauley 0

Dreams of a Threat Actor There are two crucial features of the Android OS protection system: it is impossible to download a file without user’s knowledge on a clean device; it is impossible to initialize installation of a third-party app without user’s knowledge on a clean device. These approaches greatly […]

IT threat evolution in Q1 2016

May 5, 2016 IvoryMcCauley 0

 Download PDF version Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 228,420,754 malicious attacks from online resources located in 195 countries all over the world. 74,001,808 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab’s web antivirus detected 18,610,281 unique malicious objects: scripts, […]

Google turns on HTTPS for all Blogspot blogs

May 4, 2016 Tech Guru 0

All blogs hosted on Google’s blogspot.com domain can now be accessed over an encrypted HTTPS connection. This puts more control into the hands of blog readers who value privacy. Google started offering users of its Blogger service the option to switch their blogspot.com sites to HTTPS in September, but now […]

Petya: the two-in-one trojan

May 4, 2016 IvoryMcCauley 0

Infecting the Master Boot Record (MBR) and encrypting files is nothing new in the world of malicious programs. Back in 1994, the virus OneHalf emerged that infected MBRs and encrypted the disk contents. However, that virus did not extort money. In 2011, MBR blocker Trojans began spreading (Trojan-Ransom.Win32.Mbro) that infected […]

1 2 3 57
mautic is open source marketing automation mautic is open source marketing automation