Kaspersky Lab

Latest stories

1h
Sporting Life
Kaspersky Lab Riga Open Results Full results from the Kaspersky Lab Riga Open, which took place from July 29-
Kaspersky Lab Riga Open Results
Sporting Life / Posted an hour ago
Full results from the Kaspersky Lab Riga Open, which took place from July 29-August 2. Barry Hawkins 4-1 Tom Ford Snooker Roll of Honour 2015/2016 Snooker Roll of Honour 2014/2015 New Customers Register With Sky... Read more
4 related stories
13h
International Business Times
Dyre malware disrupted after Russian authorities raid Moscow film company office Russian authorities have raided the offices of a Moscow-based film company name
Dyre malware disrupted after Russian authorities raid Moscow film company office
International Business Times / Posted 13 hours ago
Russian authorities have raided the offices of a Moscow-based film company named 25th Floor, which was allegedly involved in the world's most notorious financial hacking operation. According to cybersecurity experts Dyre — a malicious software... Read more
2 related stories
1d
Channel NewsAsia
Top cybercrime ring disrupted as authorities raid Moscow officesWASHINGTON: Russian authorities in November raided offices associated with a Mo
Top cybercrime ring disrupted as authorities raid Moscow offices
Channel NewsAsia / Posted yesterday
WASHINGTON: Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world’s most notorious financial hacking operations, according to three sources with... Read more
2 related stories
1d
Reuters
Top cybercrime ring disrupted as authorities raid Moscow officesA general view shows the building 'Gorod Stolits' (Capital City) (C), which hou
Top cybercrime ring disrupted as authorities raid Moscow offices
Reuters / Posted yesterday
A general view shows the building 'Gorod Stolits' (Capital City) (C), which houses an office of 25 Floor Film Company, at the Moscow International Business Center also known as ''Moskva-City'', in Moscow, Russia, February 3, 2016. WASHINGTON Russian... Read more
2 related stories
3d
iTWire
Personal information at risk as 9 out of 10 store private data on digital devicesA recent consumer survey by Kaspersky Lab show that way too many people are us
Personal information at risk as 9 out of 10 store private data on digital devices
iTWire / Posted 3 days ago
A recent consumer survey by Kaspersky Lab show that way too many people are using digital devices to store passwords and a wealth of private and personal information. The catch 22 – most of these devices are unprotected giving access to family,... Read more
3d
Business Wire
GCC Cyber Security Market 2016-2022 - Focus on Solutions, Services & ApplicationsDUBLIN--(BUSINESS WIRE)--Research and Markets (http://www.researchandmarkets.co
GCC Cyber Security Market 2016-2022 - Focus on Solutions, Services & Applications
Business Wire / Posted 3 days ago
DUBLIN--(BUSINESS WIRE)--Research and Markets (http://www.researchandmarkets.com/research/c8xxss/gcc_cyber) has announced the addition of the "GCC Cyber Security Market Focus on Solutions (Network Security, Endpoint Security & Others), Services... Read more
3d
CIO
What did we learn about cybersecurity in 2015?A data breach can be the biggest kind of crisis an IT leader will have to face.
What did we learn about cybersecurity in 2015?
CIO / Posted 3 days ago
A data breach can be the biggest kind of crisis an IT leader will have to face. And when an incident occurs, it’s an emergency situation – typically an all-hands-on-deck moment. After the dust settles, however, it’s time to determine what lessons... Read more
3d
Wired News
Security News This Week: Tim Cook Demands That the White House Defend EncryptionThis week, Ross Ulbricht’s defense team dropped a brief appealing for a new tri
Security News This Week: Tim Cook Demands That the White House Defend Encryption
Wired News / Posted 3 days ago
This week, Ross Ulbricht’s defense team dropped a brief appealing for a new trial, arguing that the court erroneously suppressed information about the corrupt federal agents investigating Silk Road. Using a clue from leaked Hacking Team files,... Read more
3d
iTWire
Android still number one mobile target for cybercriminalsKaspersky Internet Security for Android provides protection from these kinds o
Android still number one mobile target for cybercriminals
iTWire / Posted 3 days ago
Kaspersky Internet Security for Android provides protection from these kinds of threats. To make protection even more user-friendly and accessible, Kaspersky Lab has released an update that includes control via Android Wear smart watches. Android... Read more
4d
Web Host Industry Review
Opportunity for Service Providers Lies in Guarding Users from their Own Risky BehaviorCommunication service providers are well-positioned to generate revenue by deli
Opportunity for Service Providers Lies in Guarding Users from their Own Risky Behavior
Web Host Industry Review / Posted 4 days ago
Communication service providers are well-positioned to generate revenue by delivering targeted Security-as-a-Service to protect mobile users from themselves, according to a report published by bandwidth and broadband traffic management company Allot... Read more
4d
Computer World Australia
Malwarebytes still fixing flaws in antivirus softwareMalwarebytes said it could take three of four weeks to fix flaws in its consume
Malwarebytes still fixing flaws in antivirus software
Computer World Australia / Posted 4 days ago
Malwarebytes said it could take three of four weeks to fix flaws in its consumer product that were found by a Google security researcher. The company has fixed several server-side vulnerabilities but is still testing a new version of its... Read more
5d
iTWire
Hemisphere Technologies offers Trustwave cloud-based email securityThe company adds this to its range of corporate and consumer IT Solutions from
Hemisphere Technologies offers Trustwave cloud-based email security
iTWire / Posted 5 days ago
The company adds this to its range of corporate and consumer IT Solutions from leading vendors including Kaspersky Lab, BeyondTrust, AlienVault, Endian, and Edgility offered throughout the Asia Pacific Region. Trustwave provides advanced... Read more
5d
LinuxInsider.com
FDA Guidelines Target IoT Medical Device SecurityThe U.S. Food and Drug Administration last week took a step toward addressing t
FDA Guidelines Target IoT Medical Device Security
LinuxInsider.com / Posted 5 days ago
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "A growing number... Read more
2 related stories
5d
E-Commerce Times
FDA Guidelines Target IoT Medical Device SecurityThe U.S. Food and Drug Administration last week took a step toward addressing t
FDA Guidelines Target IoT Medical Device Security
E-Commerce Times / Posted 5 days ago
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "A growing number... Read more
2 related stories
9d
Computer Business Review
Get security wrong and you’ll see IoT stall: Why Shadow IoT is forcing the need for Security as a ServiceIn an exclusive roundtable with Telefonica, Kaspersky and NMI, industry experts
Get security wrong and you’ll see IoT stall: Why Shadow IoT is forcing the need for Security as a Service
Computer Business Review / Posted 9 days ago
In an exclusive roundtable with Telefonica, Kaspersky and NMI, industry experts stressed the need in understanding the real impact that an insecure IoT product or service can have. A key point was "how much the IoT is spreading beyond the fridge"... Read more
10d
TechNewsWorld.com
FDA Guidelines Target IoT Medical Device SecurityThe U.S. Food and Drug Administration last week took a step toward addressing t
FDA Guidelines Target IoT Medical Device Security
TechNewsWorld.com / Posted 10 days ago
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "A growing number... Read more
11d
Pilipino Star
Pinoy net users careless about passwords – studyMANILA, Philippines – Almost half of the world’s Internet users admit to being
Pinoy net users careless about passwords – study
Pilipino Star / Posted 11 days ago
MANILA, Philippines – Almost half of the world’s Internet users admit to being careless with their passwords, making them vulnerable to hacking. A global study conducted by the Internet security firm Kaspersky Lab, whose more than 1,000 respondents... Read more
11d
Manila Bulletin
Kaspersky Lab survey: 44% of Internet users share their passwords Nearly half or 44% of Internet users have admitted that they have shared thei
Kaspersky Lab survey: 44% of Internet users share their passwords
Manila Bulletin / Posted 11 days ago
Nearly half or 44% of Internet users have admitted that they have shared their passwords with someone or have left their passwords visible for everyone to see, according to a recent... Read more
12d
techcentral.ie
Tor and the enterprise 2016 - blocking malware, darknet use and rogue nodesTor and the enterprise 2016 – blocking malware, darknet use and rogue no
Tor and the enterprise 2016 - blocking malware, darknet use and rogue nodes
techcentral.ie / Posted 12 days ago
Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes Admins debate benefits of whether to allow anonymous browsing In the right place Tor is a godsend, in the wrong it presents a significant problem. Ever since The... Read more
13d
Slate
The Biggest Danger to Internet-Connected Medical DevicesThe citizen’s guide to the future. Security researcher Beau Woods will never f
The Biggest Danger to Internet-Connected Medical Devices
Slate / Posted 13 days ago
The citizen’s guide to the future. Security researcher Beau Woods will never forget the day he got a call from the natal intensive care unit. The fetal heart monitors kept rebooting, putting infant lives at risk. The Zotob worm was big that year,... Read more
13d
Computer Business Review
MP urges banks to improve IT systems after glitches & cyber attacksTyrie has written to Andrew Bailey, Deputy Governor of the Bank of England and
MP urges banks to improve IT systems after glitches & cyber attacks
Computer Business Review / Posted 13 days ago
Tyrie has written to Andrew Bailey, Deputy Governor of the Bank of England and Chief Executive Officer of the Prudential Regulation Authority (PRA), and Tracey McDermott, Acting Chief Executive of the FCA, having published the correspondence he had... Read more
18d
iTWire
New financial malware, Asacub, targets AndroidFor the first time in 2015 a mobile banking Trojan was one of Top-10 most preva
New financial malware, Asacub, targets Android
iTWire / Posted 18 days ago
For the first time in 2015 a mobile banking Trojan was one of Top-10 most prevalent malicious programs targeting finances. The first version of the Asacub Trojan, discovered in June 2015, was capable of stealing the contact lists, browser history,... Read more
18d
Computer Business Review
Trump, Hilton & Hyatt hotel hacks: Why hackers check-in with malware, and check-out with dataRoom service, free tea and biscuits, extensive breakfast buffet, miniature toil
Trump, Hilton & Hyatt hotel hacks: Why hackers check-in with malware, and check-out with data
Computer Business Review / Posted 18 days ago
Room service, free tea and biscuits, extensive breakfast buffet, miniature toiletries and a turndown service with a chocolate on the pillow - just a few of the little luxuries offered by hotels to make a guest's stay that little bit more... Read more
2 related stories
20d
Finextra
WISeKey and Kaspersky Lab to develop wearables security techThe two companies have today announced that they are developing technology that
WISeKey and Kaspersky Lab to develop wearables security tech
Finextra / Posted 20 days ago
The two companies have today announced that they are developing technology that will deeply integrate authentication and data encryption into new wearable devices, enabling them to safely connect, communicate and exchange financial data. The... Read more
20d
AllAfrica.com
Banks 'Coping' Amid Global Cybercrime WaveLocal banks are investing in cybercrime defence as financial institutions globa
Banks 'Coping' Amid Global Cybercrime Wave
AllAfrica.com / Posted 20 days ago
Local banks are investing in cybercrime defence as financial institutions globally face an increasing trend of cyber theft, an international survey has found. According to a survey by security company Kaspersky Lab and B2B International, a third of... Read more
22d
iTWire
Wearables need protection tooSmart watches, fitness trackers and payment wristbands are expected to account
Wearables need protection too
iTWire / Posted 22 days ago
Smart watches, fitness trackers and payment wristbands are expected to account for one in five mobile payment transactions by 2020. Kaspersky Labs says it is inevitable that they will become a growing target for cyber-attack. The market for... Read more
23d
Computer Business Review
10 tech speakers at the 2016 World Economic Forum in DavosThe World Economic Forum will held from the 20th until the 23rd January 2016, a
10 tech speakers at the 2016 World Economic Forum in Davos
Computer Business Review / Posted 23 days ago
The World Economic Forum will held from the 20th until the 23rd January 2016, at the Davos-Klosters resort in Switzerland. Some of the biggest names in tech will be there, alongside the leaders from politics, finance and the media. The title of the... Read more
23d
Ars Technica
How malware developers could bypass Mac’s Gatekeeper without really tryingIn September, Ars reported a drop-dead simple exploit that completely bypassed
How malware developers could bypass Mac’s Gatekeeper without really trying
Ars Technica / Posted 23 days ago
In September, Ars reported a drop-dead simple exploit that completely bypassed an OS X security feature known as Gatekeeper. Apple shipped a fix, but now the security researcher who discovered the original vulnerability said he found an equally... Read more
3 related stories
23d
AllAfrica.com
Sharing Passwords Exposes SA to CriminalsJohannesburg — NEARLY half of South African internet users are at risk of suffe
Sharing Passwords Exposes SA to Criminals
AllAfrica.com / Posted 23 days ago
Johannesburg — NEARLY half of South African internet users are at risk of suffering intrusions by cybercriminals after sharing their passwords. This is according to findings of a recent consumer survey suggesting 42 percent of users had been lax... Read more
24d
PC Advisor
Kaspersky Lab partners with WISeKey for wearable securityKaspersky Lab has joined forces with Swiss security company, WISeKey, to develo
Kaspersky Lab partners with WISeKey for wearable security
PC Advisor / Posted 24 days ago
Kaspersky Lab has joined forces with Swiss security company, WISeKey, to develop technology to integrate authentication and data... Read more
25d
techcentral.ie
Trend Micro flaw could have allowed attacker to steal passwordsProblem patched, and another remote execution flaw found by a well-known Google
Trend Micro flaw could have allowed attacker to steal passwords
techcentral.ie / Posted 25 days ago
Problem patched, and another remote execution flaw found by a well-known Google security researcher A discovery by a well-known Google security researcher provides further proof how antivirus programs designed to shield computers from attacks can... Read more
3 related stories
26d
International Business Times
It's official, your smart TV can be hijacked: Malware is holding viewers to ransom It's official – you have lived to see the day that your television is now so sm
It's official, your smart TV can be hijacked: Malware is holding viewers to ransom
International Business Times / Posted 26 days ago
It's official – you have lived to see the day that your television is now so smart that it can be hijacked, and traditional PC problems with malware and ransomware might soon become a problem in home entertainment too. The year has only just begun,... Read more
26d
PC Advisor
Trend Micro flaw could have allowed attacker to steal all passwords A discovery by a well-known Google security...
Trend Micro flaw could have allowed attacker to steal all passwords
PC Advisor / Posted 26 days ago
A discovery by a well-known Google security... Read more
3 related stories
26d
Computer World Australia
Trend Micro flaw could have allowed attacker to steal all passwordsA discovery by a well-known Google security researcher provides further proof h
Trend Micro flaw could have allowed attacker to steal all passwords
Computer World Australia / Posted 26 days ago
A discovery by a well-known Google security researcher provides further proof how antivirus programs designed to shield computers from attacks can sometimes provide a doorway for hackers. Tavis Ormandy, an information security engineer with Google,... Read more
3 related stories
27d
Ars Technica
Google security researcher excoriates TrendMicro for critical AV defectsAntivirus provider TrendMicro has released an emergency product update that fix
Google security researcher excoriates TrendMicro for critical AV defects
Ars Technica / Posted 27 days ago
Antivirus provider TrendMicro has released an emergency product update that fixes critical defects that allow attackers to execute malicious code and to view contents of a password manager built in to the malware protection program. The release came... Read more
27d
CircleID
Internet Governance Outlook 2016: Cooperation & ConfrontationIn 2015 we saw many agreements on Internet Governance. 193 Governments agreed i
Internet Governance Outlook 2016: Cooperation & Confrontation
CircleID / Posted 27 days ago
In 2015 we saw many agreements on Internet Governance. 193 Governments agreed in the UN General Assembly on the WSIS 10+ Outcome Document. They agreed to extend the mandate of the IGF for ten years. They agreed to strengthen the multistakeholder... Read more
27d
techcentral.ie
Antivirus software could make companies more vulnerableSecurity researchers are worried that critical vulnerabilities in AV products a
Antivirus software could make companies more vulnerable
techcentral.ie / Posted 27 days ago
Security researchers are worried that critical vulnerabilities in AV products are too easy to find and exploit Imagine getting a call from your company’s IT department telling you your workstation has been compromised and you should stop what you’re... Read more
27d
iTWire
Identity theft is the new black in 2016If you are younger - 24 years or less - you typically reveal more personal info
Identity theft is the new black in 2016
iTWire / Posted 27 days ago
If you are younger - 24 years or less - you typically reveal more personal information online and take fewer steps to protect it – but you have a better understanding of potential threats and can recognize them more easily. If you are mature - 45... Read more
28d
CNET
Interactive comic explores the heartbreaking frailty of memorySutu's grandfather is losing his memories. This is not an unusual experience.
Interactive comic explores the heartbreaking frailty of memory
CNET / Posted 28 days ago
Sutu's grandfather is losing his memories. This is not an unusual experience. However, Sutu, aka Stuart Campbell, is unusual. A creator of comics that integrate digital technologies, he had a pertinent means of sharing his grandfather's story, and... Read more
28d
International Business Times
Tyupkin ATM malware: European authorities dismantle criminal group behind cash-machine attacks Law-enforcement agencies have managed to arrest a criminal group of eight peopl
Tyupkin ATM malware: European authorities dismantle criminal group behind cash-machine attacks
International Business Times / Posted 28 days ago
Law-enforcement agencies have managed to arrest a criminal group of eight people responsible for ATM malware attacks to empty cash machines. The joint operation by the Romanian National Police and Directorate for Investigating Organised Crimes and... Read more
30d
PC Advisor
Antivirus software could make your company more vulnerableCyberespionage groups could easily exploit vulnerabilities in antivirus program
Antivirus software could make your company more vulnerable
PC Advisor / Posted 30 days ago
Cyberespionage groups could easily exploit vulnerabilities in antivirus programs to break into corporate networks, according to... Read more
30d
Computer World Australia
Antivirus software could make your company more vulnerableImagine getting a call from your company's IT department telling you your works
Antivirus software could make your company more vulnerable
Computer World Australia / Posted 30 days ago
Imagine getting a call from your company's IT department telling you your workstation has been compromised and you should stop what you're doing immediately. You're stumped: You went through the company's security training and you're sure you didn't... Read more
30d
PC Advisor
Authorities dismantle criminal gang that used malware to steal cash from ATMs Law enforcement...
Authorities dismantle criminal gang that used malware to steal cash from ATMs
PC Advisor / Posted 30 days ago
Law enforcement... Read more
30d
Computer World Australia
Authorities dismantle criminal gang that used malware to steal cash from ATMsLaw enforcement authorities from Romania and the Republic of Moldova have broke
Authorities dismantle criminal gang that used malware to steal cash from ATMs
Computer World Australia / Posted 30 days ago
Law enforcement authorities from Romania and the Republic of Moldova have broken up a gang of criminals that stole 200,000 euros from ATMs in the E.U. and Russia after infecting them with a malware program. The program was first documented by... Read more

People in this news