hackers - News, Features, and Slideshows
- Secure web services
- The week in security: Password managers, IT managers under fire over security disconnect
- With walls breached, document protection is the new security imperative
- Government-grade code found in criminal malware
hackers in pictures
Whether driven by hackers becoming more aggressive, or by new regulations increasing visibility around an ongoing problem, growing reports of data theft are prompting organisations to take urgent and proactive measures to protect business documents during every stage of their life cycle.
Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.
If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also questionable government agencies with the right tools. Unfortunately, one of the key programs we all use to interface with the net is also the one of the primary vectors of attack -- the humble web browser.
Cybercriminals have inserted government-grade malware into run-of-the-mill ransomware and online banking Trojans to bolster their ability to avoid detection and block tampering.
A survey on use of unauthorised software found that malware fears are more of a deterrent than the threat of penalties, and with good reason.
Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Sign up now »
Kaspersky Open Space Security provides complete business protection in a single integrated suite of applications that work seamlessly across all platforms.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.