Spam and phishing in Q2 2018

by Maria Vergelis
14 Aug 2018 at 10:00am
Average spam volume of 49.66% in world mail traffic in this quarter fell 2.16 p.p. in comparison with the previous reporting period, and the Antiphishing system prevented more than 107M attempts to connect users to phishing sites, which is 17M more than in the first quarter of 2018.

KeyPass ransomware

by Orkhan Mamedov
13 Aug 2018 at 12:21pm
In the last few days, our anti-ransomware module has been detecting a new variant of malware - KeyPass ransomware. According to our information, the malware is propagated by means of fake installers that download the ransomware module.

IT threat evolution Q2 2018

by David Emm
6 Aug 2018 at 10:00am
Olympic Destroyer worm, Roaming Mantis mobile banker, Operation Parliament cyber-espionage campaign, SynAck ransomware and other notable targeted attacks and malware campaigns of Q2 2018.

IT threat evolution Q2 2018. Statistics

by Victor Chebyshev
6 Aug 2018 at 10:00am
In Q2 2018, attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 215,762 users, ransomware attacks were registered on the computers of 158,921 unique users.

How do file partner programs work?

by Mariya Fedorova
2 Aug 2018 at 10:00am
It?s easy to notice if you've fallen victim to an advertising partner program: the system has new apps that you didn?t install, ad pages spontaneously open in the browser, ads appear on sites where they never used to, and so on. If you notice these symptoms on your computer, 99% of the time it?s ...

Attacks on industrial enterprises using RMS and TeamViewer

by Vyacheslav Kopeytsev
1 Aug 2018 at 10:00am
Kaspersky Lab ICS CERT has identified a new wave of phishing emails with malicious attachments targeting primarily companies and organizations that are, in one way or another, associated with industrial production.

A mining multitool

by Vladas Bulavas
26 Jul 2018 at 10:00am
Recently, an interesting miner implementation appeared on Kaspersky Lab?s radar. The malware, which we dubbed PowerGhost, is capable of stealthily establishing itself in a system and spreading across large corporate networks infecting both workstations and servers.

A study of car sharing apps

by Victor Chebyshev
25 Jul 2018 at 10:00am
The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. But information security specialists have started raising some pertinent questions: how are the users of these services protected and what potential risks do they face in ...

DDoS attacks in Q2 2018

by Timur Ibragimov
24 Jul 2018 at 9:00am
In H1 2018, the average and maximum attack power fell significantly compared to H2 2017. In Q2 2018, cybercriminals continued the above-outlined trend of searching for exotic holes in UDP transport protocols. It surely won?t be long before we hear about other sophisticated methods of attack ampli...

Calisto Trojan for macOS

by Mikhail Kuzin
20 Jul 2018 at 10:00am
As researchers we interesting in developmental prototypes of malware that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that we named Calisto.

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites