Eavesdropping on keyboard keystrokes | Kaspersky official blog
Kaspersky Lab official blog
by Enoch Root
10h ago
U.S. researchers recently published a paper demonstrating that useful information can be extracted from the sounds of keystrokes. This is certainly not the first study of its kind; moreover, the results can’t even be considered more accurate than the conclusions of its predecessors. However, what makes this one interesting is that the researchers weren’t aiming for perfect, lab-controlled conditions. Instead, they wanted to see how it works in fairly realistic conditions: a somewhat noisy room, a not-so-great microphone, and so on. Attack model We often get eavesdropped on without even realizi ..read more
Visit website
Transatlantic Cable podcast episode 340 | Kaspersky official blog
Kaspersky Lab official blog
by David Buxton
10h ago
Episode 340 of the Transatlantic Cable podcast kicks off with news that the EU is investigating Meta, Apple and Google for “uncompetitive practices.” Additionally, the US government has gone ahead and levelled a lawsuit against Apple, for what they see as “monopoly” behaviour with their hardware. To wrap up, the team discuss two stories, the first around China and UK government hacking concerns and how age-verification for adult sites could actually be a bad thing in the long run. If you liked what you heard, please consider subscribing. Apple, Meta and Google to be investigated by the EU US ..read more
Visit website
Best Defense in 2024 | Kaspersky official blog
Kaspersky Lab official blog
by Kaspersky Team
10h ago
Choosing the right cybersecurity solution is no easy task. Friends’ opinions and/or crowdsourced ratings — which are great for simpler products and services — are less reliable. While these can help with assessing user interfaces and overall usability, they’re not much good for assessing the quality of protection against advanced threats. The most balanced, objective source is independent expert research by specialized testing labs and media. Yes, independent — they must have no ties to any vendor whose products they evaluate whatsoever. We’ve always taken independent testing of our products a ..read more
Visit website
Ways to detect and curb Living off the Land (LotL) attacks | Kaspersky official blog
Kaspersky Lab official blog
by Stan Kaminsky
5d ago
Should serious-minded attackers choose namely your company to target, they’d certainly be looking to gain a long-term, persistent presence in your infrastructure. Some would deploy high-end malware to achieve this – but others prefer not to. Many, in fact, prefer to attack companies by exploiting vulnerabilities, stolen credential, and legitimate programs that are already in the system. This technique – known as Living off the Land (LotL) – has many advantages from an attacker’s point of view: Malicious activity blends in with everyday network and administrative activities. Tools already inst ..read more
Visit website
What commercial spyware is, and what different types there are | Kaspersky official blog
Kaspersky Lab official blog
by Alanna Titterington
5d ago
Commercial spyware has of late been making the headlines with increasing frequency. And we’re not just talking about media channels dedicated to IT or cybersecurity; reports on commercial spyware have been appearing regularly in mainstream media for some time now. In this post, we discuss the existing commercial spyware packages, how they operate, what they’re capable of, and why they’re dangerous. And as always, we finish with advice on how to defend against them. What is commercial spyware? Let’s start with a definition. Commercial spyware is legal malware created by private companies and de ..read more
Visit website
Transatlantic Cable podcast episode 339 | Kaspersky official blog
Kaspersky Lab official blog
by David Buxton
1w ago
Episode 339 of the Transatlantic Cable podcast kicks off with news that several employees in TikTok were caught covertly spying on Forbes journalists. From there, the team talk about a new cooperation between governments to better tackle spyware and news that the FTC is looking at the upcoming Reddit IPO and AI training data. To close out the podcast, the team discuss news that ‘at least 900’ websites built using Google’s FireBase cloud database may be leaking sensitive user data. If you liked what you heard, please consider subscribing. TikTok Spied On Forbes Journalists Finland, Germany, Ir ..read more
Visit website
What is SIM swapping, and how does it threaten business? | Kaspersky official blog
Kaspersky Lab official blog
by Alanna Titterington
1w ago
Today’s topic is SIM swap fraud, aka SIM swapping. This attack method is far from new but remains a live threat because of how effective it is. SIM swapping attacks pose a serious danger to business because they enable threat actors to gain access to corporate communications, accounts, and sensitive information like financial data. What is SIM swapping? SIM swapping is an attack method for hijacking a mobile phone number and transferring it to a device owned by the attackers. Put simply, said attackers go to a mobile telecoms operator’s office, somehow wangle a new SIM card with the number of ..read more
Visit website
How Wi-Fi WPA2 is hacked using PMKID interception | Kaspersky official blog
Kaspersky Lab official blog
by Alanna Titterington
1w ago
Being concerned about the security of your wireless network is not as paranoid as some may think it is. Many routers have a setting enabled by default that makes your WPA/WPA2-protected Wi-Fi network rather vulnerable. In this post, we’ll discuss one of the most effective methods of hacking wireless networks that exploits this setting, and how to protect against it. The simplest and most effective attack on WPA/WPA2-PSK: PMKID interception PMKID interception is the most effective, easy-to-execute, and completely undetectable method of attacking wireless networks protected by the WPA/WPA2 stand ..read more
Visit website
Transatlantic Cable podcast episode 338 | Kaspersky official blog
Kaspersky Lab official blog
by David Buxton
2w ago
Episode 338 of the Transatlantic Cable podcast kicks off with the story of the year (so far) as some people see it – the Kate Middleton / photoshop mess. Is it really as big a deal as some believe it to be, or is it just a silly mistake? From there the team discuss news that South Korea have developed a tool to help scan images for deepfakes, but will it be useful enough to be of any use? Additionally, the team talk about the Play ransomware gang and will GDPR shut down WorldCoin? If you liked what you heard, please consider subscribing. Kate photo withdrawn by five news agencies amid ‘manipu ..read more
Visit website
How to protect yourself from the pig butchering scam | Kaspersky official blog
Kaspersky Lab official blog
by Alanna Titterington
2w ago
Today, we’re discussing the increasingly common scam known as pig butchering. Due to its high profitability, this scheme is rapidly gaining popularity among fraudsters, and the number of victims is constantly growing. What is it? How does it work? And how can you protect yourself? We’ll cover it all in today’s post. What is pig butchering and how does this scam work? Pig butchering is a type of scam associated, on the one hand, with investing (often in cryptocurrencies), and on the other, with online romantic relationships. Just as pigs are raised for a long time before being slaughtered, in t ..read more
Visit website

Follow Kaspersky Lab official blog on FeedSpot

Continue with Google
Continue with Apple
OR