WordPress 4.4.1 Update Resolves XSS Vulnerability
Developers at WordPress are warning users of the content management system to download and apply the most recent update, pushed yesterday, to address a cross-site scripting vulnerability.
Source: Threadpost
IT threat evolution in Q1 2016
Download PDF version
Q1 figures
According to KSN data, Kaspersky Lab solutions detected and repelled 228,420,754 malicious attacks from online resources located in 195 countries all over the world.
74,001,808 unique URLs were recognized...
I know where your pet is
Kaspersky Lab’s many years of cyberthreat research would suggest that any device with access to the Internet will inevitably be hacked. In recent years, we have seen hacked toys, kettles, cameras,...
IT threat evolution Q2 2017. Statistics
Q2 figures
According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world.
33, 006, 783 unique URLs...
Mobile Advertising Firm Found Tracking Users To Pay $950K
A mobile advertising company that settled charges with the Federal Trade Commission this week will pay nearly $1M after it was determined the company tracked customers – including children – without...
Researchers Reveal Bypass for Apple’s USB Restricted Mode
Researchers released a workaround for Apple's USB Restricted Mode security feature the same day it was rolled out.
Source: Threadpost
Operation Daybreak
Earlier this year, we deployed new technologies in Kaspersky Lab products to identify and block zero-day attacks. This technology already proved its effectiveness earlier this year, when it caught an Adobe...
IT threat evolution in Q2 2016. Overview
Download the full report (PDF)
Targeted attacks and malware campaigns
Cha-ching! Skimming off the cream
Earlier in the year, as part of an incident response investigation, we uncovered a new version of the Skimer...
Kaspersky DDoS Intelligence Report for Q4 2015
Q4 events
Of all the Q4 2015 events in the world of DDoS attacks and the tools used to launch them, we picked out those that, in our opinion, best illustrate the...
Google Chrome Bug Opens Access to Private Facebook Information
The method could be used to deduce the age, sex, likes or the location history of a user – essentially, the attacker can play “20 questions” to profile the victim.
Source: Threadpost