VPN Leaks: Knowing, Understanding and Preventing

VPNs have become much more popular as a way for people to keep their data secure in an increasingly insecure world. As the technology has grown in prevalence, a number of different types of VPNs have come to market, which has increased the chances of … Continue reading VPN Leaks: Knowing, Understanding and Preventing

Kaspersky Security Bulletin 2018. Top security stories

All too often, both rely on manipulating human psychology as a way of compromising entire systems or individual computers. Increasingly, the devices targeted also include those that we don’t consider to be computers – from children’s toys to security cameras. Here is our annual round-up of major incidents and key trends from 2018 Continue reading Kaspersky Security Bulletin 2018. Top security stories

Hey there! How much are you worth?

I decided to investigate the black market and see what kind of information is being sold there. We all know that you can buy drugs, weapons and stolen goods there, but you can also buy online identities. How much do you think your online identity is worth? Continue reading Hey there! How much are you worth?

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one network can have from another,… Continue reading Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Study: Alarming Number of Fortune 500 Credentials Found in Data Leaks

Data breaches are common in the news lately, but a recent study by credential monitoring firm Vericlouds focuses specifically on the credentials of Fortune 500 employees found in account leaks posted online. Using a corpus of 8 billion stolen credentia… Continue reading Study: Alarming Number of Fortune 500 Credentials Found in Data Leaks

Investigation Report for the September 2014 Equation malware detection incident in the US

In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. To assist any independent investigators and all the people who have been asking us questions whether those allegations were true, we decided to conduct an internal investigation to attempt to answer a few questions we had related to the article and some others Continue reading Investigation Report for the September 2014 Equation malware detection incident in the US

New tools help could help prevent Amazon S3 data leaks

 If you do a search for Amazon S3 breaches due to customer error of leaving the data unencrypted, you’ll see a long list that includes a DoD contractor, Verizon (the owner of this publication) and Accenture, among the more high profile examples. Today, AWS announced a new set of five tools designed to protect customers from themselves and ensure (to the extent possible) that the data in S3… Read More Continue reading New tools help could help prevent Amazon S3 data leaks