How we protect our users against the Sunburst backdoor

The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on SolarWinds and we will add additional detection once they are required. Continue reading How we protect our users against the Sunburst backdoor

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform. Continue reading A Modern Hypervisor as a Basis for a Sandbox

False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Regretfully, only then does the idea dawn on these developers that high-quality protection from cyberthreats involves not only prevention but also a low false-positive rate. Continue reading False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

The security is still secure

Recently WikiLeaks published a report that, among other things, claims to disclose tools and tactics employed by a state-sponsored organization to break into users’ computers and circumvent installed security solutions. The list of compromised security products includes dozens of vendors and relates to the whole cybersecurity industry. Continue reading The security is still secure

How Security Products are Tested – Part 1

The demand for tests appeared almost simultaneously with the development of the first antivirus programs. Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions, and later an industry of specialized companies emerged with a more comprehensive approach to testing methods. Continue reading How Security Products are Tested – Part 1

Lost in Translation, or the Peculiarities of Cybersecurity Tests

AV-Comparatives simultaneously conducted two tests of cybersecurity products using one and the same methodology. What’s the difference between them and how to read the reports to see manipulation of figures and recognize biased marketing ‘next-gen’ rhetoric. Continue reading Lost in Translation, or the Peculiarities of Cybersecurity Tests

Lost in Translation, or the Peculiarities of Cybersecurity Tests

AV-Comparatives simultaneously conducted two tests of cybersecurity products using one and the same methodology. What’s the difference between them and how to read the reports to see manipulation of figures and recognize biased marketing ‘next-gen’ rhetoric. Continue reading Lost in Translation, or the Peculiarities of Cybersecurity Tests