Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote

With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications. Continue reading Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote

Threat Predictions for Connected Life in 2018

Every year, Kaspersky Lab’s experts look at the main cyberthreats facing connected businesses over the coming 12 months, based on the trends seen during the year. For 2018, we decided to extract some top predictions that also have big implications for everyday connected life. Continue reading Threat Predictions for Connected Life in 2018

Threat Predictions for Financial Services and Fraud in 2018

2018 will be a year of innovation in financial services as the pace of change in this space continues to accelerate. As more channels and new financial service offerings emerge, threats will diversify. Financial services will need to focus on omni-channel fraud prevention to successfully identify more fraud crossing from online accounts to newer channels. Continue reading Threat Predictions for Financial Services and Fraud in 2018

Kaspersky Security Bulletin: Threat Predictions for 2018

Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new event is an exciting new research avenue for us, as what were once theoretical problems find palpable expression in reality. On the other hand, as people with a heightened concern for the security posture of users at large, each event is a bigger catastrophe. Continue reading Kaspersky Security Bulletin: Threat Predictions for 2018

How shared Android libraries could be weaponized for data theft

When you’re installing an Android app, pause before you approve one that asks for a lot of permissions – do you really need that app on your device? Continue reading How shared Android libraries could be weaponized for data theft

Mobile apps and stealing a connected car

The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. By using proprietary mobile apps, it is possible to get some useful features, but if a car thief were to gain access to the mobile device that belongs to a victim that has the app installed, then would car theft not become a mere trifle? Continue reading Mobile apps and stealing a connected car

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ C&C. In addition, the compromised devices were pushed Trojan updates. The operation remains active at the time of writing this post. Continue reading Breaking The Weakest Link Of The Strongest Chain