Results for "Kaspersky"

RCS malware affects iOS and Android devices internationally

RCS malware affects iOS and Android devices internationally

Remote Control System malware has been identified by the folks at Kaspersky Lab this week as affecting both iOS (iPhone) and Android devices across the planet. This system is said to be controlled by an international infrastructure which allows this "legal" spyware to take hold of devices at the hands of the company known as HackingTeam.

Continue Reading

Behind “The Mask”: Huge, sophisticated “Careto” malware discovered

Behind “The Mask”: Huge, sophisticated “Careto” malware discovered

What could be one of the most advanced cyber-espionage and malware systems has been identified, with Kaspersky Lab discovering a wide-reaching hacking scheme that has affected more than 380 different victims across 31 different countries. Dubbed "The Mask" from the Spanish slang "Careto" - meaning "ugly face" or "mask" - found in the malware code, the hackers have put together what Kaspersky describes as an "extremely sophisticated" set of tools including versions for Windows, Mac, Linux, and potentially Android and iOS. In addition to the broad range of potential victims, the amount of data that can be extracted from an infected machine is vast.

Continue Reading

Watch Dogs game true-to-life hacking developed with real security pros

Watch Dogs game true-to-life hacking developed with real security pros

The development team at Ubisoft have been working on the game Watch Dogs for an unusually long time. This hacker-themed game has been in development for 4.5 years, long enough for the original concept to have gotten so close to real life that its developers have been able to easily consult with a team of real-world security experts at Kaspersky Lab, bringing the game to a place where, at release, it wont be impossible to imagine its action as a real-world situation.

Continue Reading

Lookout demonstrates how easy it is to hack a phone

Lookout demonstrates how easy it is to hack a phone

Lookout CEO John Hering showed everyone just how easy it is for a phone to be hacked. At All Thing's D's conference, D: Dive Into Mobile, Hering worked together with All Things D's Liz Gannes to demonstrate a few examples of common hacks that can affect phones. Hering says that there is a "fundamental shift in the attacks on mobile devices in a post-PC era," and that its very easy to spoof emails.

Continue Reading

Skype trojan turns your computer into a Bitcoin miner

Skype trojan turns your computer into a Bitcoin miner

There is a Skype trojan going around that is turning PCs into Bitcoin miners. So far, victims are mostly located in countries like Italy, Russia, Poland, Costa Rica, Spain, Germany, and a few others. Bitcoin Mining is a another way for users to acquire Bitcoin's currency by "making computer hardware do mathematical calculations for the Bitcoin network to confirm transactions and increase security."

Continue Reading

Experts say Spamhaus attack is first of many to come

Experts say Spamhaus attack is first of many to come

Earlier today, we reported on a cyber-battle between two groups that ended up dragging the entire internet along with it. The week-long battle between Spamhaus, an anti-spam group, and Cyberbunker, a web host known for hosting spam sites, led to a "global internet slowdown", and it looks like the battle is long from being over. Spamhaus has no intention to stop until Cyberbunker is brought down.

Continue Reading

MiniDuke virus attacks government institutions all around the world

MiniDuke virus attacks government institutions all around the world

It looks like this just isn’t Adobe’s week. A new virus, called MiniDuke, has been attacking government institutions all around Europe and the United States using a security exploit in the Adobe Reader program. The virus is sent around as a very credible looking PDF file. The file carries information about a human rights seminar (ASEM), Ukraine’s foreign policy, and NATO membership plans. But while the information might seem credible on the surface, it secretly uploads malware onto the computer and disguises itself from various anti-malware, anti-virus, and other cyber-security programs.

Continue Reading

1 2 3 4 5