WordPress 4.4.1 Update Resolves XSS Vulnerability

Developers at WordPress are warning users of the content management system to download and apply the most recent update, pushed yesterday, to address a cross-site scripting vulnerability. Source: Threadpost

IT threat evolution in Q1 2016

 Download PDF version Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 228,420,754 malicious attacks from online resources located in 195 countries all over the world. 74,001,808 unique URLs were recognized...

I know where your pet is

Kaspersky Lab’s many years of cyberthreat research would suggest that any device with access to the Internet will inevitably be hacked. In recent years, we have seen hacked toys, kettles, cameras,...

IT threat evolution Q2 2017. Statistics

Q2 figures According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. 33, 006, 783 unique URLs...

Mobile Advertising Firm Found Tracking Users To Pay $950K

A mobile advertising company that settled charges with the Federal Trade Commission this week will pay nearly $1M after it was determined the company tracked customers – including children – without...

Researchers Reveal Bypass for Apple’s USB Restricted Mode

Researchers released a workaround for Apple's USB Restricted Mode security feature the same day it was rolled out. Source: Threadpost

Operation Daybreak

Earlier this year, we deployed new technologies in Kaspersky Lab products to identify and block zero-day attacks. This technology already proved its effectiveness earlier this year, when it caught an Adobe...

IT threat evolution in Q2 2016. Overview

 Download the full report (PDF) Targeted attacks and malware campaigns Cha-ching! Skimming off the cream Earlier in the year, as part of an incident response investigation, we uncovered a new version of the Skimer...

Kaspersky DDoS Intelligence Report for Q4 2015

Q4 events Of all the Q4 2015 events in the world of DDoS attacks and the tools used to launch them, we picked out those that, in our opinion, best illustrate the...

Google Chrome Bug Opens Access to Private Facebook Information

The method could be used to deduce the age, sex, likes or the location history of a user – essentially, the attacker can play “20 questions” to profile the victim. Source: Threadpost
- Advertisement -

APLICATIONS

Black Hat 2018: Google’s Tabriz Talks Complex Security Landscapes

At Black Hat, Google's Parisa Tabriz discussed how to navigate the complex security environment with long-term thinking and a policy of open collaboration. Source: Threadpost