Results for "Kaspersky"

Behind “The Mask”: Huge, sophisticated “Careto” malware discovered

Behind “The Mask”: Huge, sophisticated “Careto” malware discovered

What could be one of the most advanced cyber-espionage and malware systems has been identified, with Kaspersky Lab discovering a wide-reaching hacking scheme that has affected more than 380 different victims across 31 different countries. Dubbed "The Mask" from the Spanish slang "Careto" - meaning "ugly face" or "mask" - found in the malware code, the hackers have put together what Kaspersky describes as an "extremely sophisticated" set of tools including versions for Windows, Mac, Linux, and potentially Android and iOS. In addition to the broad range of potential victims, the amount of data that can be extracted from an infected machine is vast.

Continue Reading

Watch Dogs game true-to-life hacking developed with real security pros

Watch Dogs game true-to-life hacking developed with real security pros

The development team at Ubisoft have been working on the game Watch Dogs for an unusually long time. This hacker-themed game has been in development for 4.5 years, long enough for the original concept to have gotten so close to real life that its developers have been able to easily consult with a team of real-world security experts at Kaspersky Lab, bringing the game to a place where, at release, it wont be impossible to imagine its action as a real-world situation.

Continue Reading

Lookout demonstrates how easy it is to hack a phone

Lookout demonstrates how easy it is to hack a phone

Lookout CEO John Hering showed everyone just how easy it is for a phone to be hacked. At All Thing's D's conference, D: Dive Into Mobile, Hering worked together with All Things D's Liz Gannes to demonstrate a few examples of common hacks that can affect phones. Hering says that there is a "fundamental shift in the attacks on mobile devices in a post-PC era," and that its very easy to spoof emails.

Continue Reading

Skype trojan turns your computer into a Bitcoin miner

Skype trojan turns your computer into a Bitcoin miner

There is a Skype trojan going around that is turning PCs into Bitcoin miners. So far, victims are mostly located in countries like Italy, Russia, Poland, Costa Rica, Spain, Germany, and a few others. Bitcoin Mining is a another way for users to acquire Bitcoin's currency by "making computer hardware do mathematical calculations for the Bitcoin network to confirm transactions and increase security."

Continue Reading

Experts say Spamhaus attack is first of many to come

Experts say Spamhaus attack is first of many to come

Earlier today, we reported on a cyber-battle between two groups that ended up dragging the entire internet along with it. The week-long battle between Spamhaus, an anti-spam group, and Cyberbunker, a web host known for hosting spam sites, led to a "global internet slowdown", and it looks like the battle is long from being over. Spamhaus has no intention to stop until Cyberbunker is brought down.

Continue Reading

MiniDuke virus attacks government institutions all around the world

MiniDuke virus attacks government institutions all around the world

It looks like this just isn’t Adobe’s week. A new virus, called MiniDuke, has been attacking government institutions all around Europe and the United States using a security exploit in the Adobe Reader program. The virus is sent around as a very credible looking PDF file. The file carries information about a human rights seminar (ASEM), Ukraine’s foreign policy, and NATO membership plans. But while the information might seem credible on the surface, it secretly uploads malware onto the computer and disguises itself from various anti-malware, anti-virus, and other cyber-security programs.

Continue Reading

Java tipped in Red October – may be Homeland Security’s hang-up

Java tipped in Red October – may be Homeland Security’s hang-up

Over the past several days, the US Department of Homeland Security has issued warnings against using Java due to newly discovered security weaknesses - today it's been tipped that the Red October cyberespionage attacks may have had their own Java iterations. The two have not been put together by the Israeli IT security firm Seculert, the group that today suggests Red October was implemented not just via email downloads and USB sticks, but through web-based Java exploits as well. Could that and Homeland Security's warning be timed both right here at this point in time together without any relation to one another?

Continue Reading

Batchwiper malware wipes disk partitions on Iranian computers

Batchwiper malware wipes disk partitions on Iranian computers

Iranian computer systems have been hit with another bout of damage, this time from the malware Batchwiper, which, as its name suggests, infects a computer and promptly proceeds to wipe its disk partitions and user profile directories. The attack is said to be simplistic and is designed to only wipe data on specific dates, with the next one being January 21. Thus far, how the malware is spreading to machines is unknown.

Continue Reading

1 2 3 4 5