Knowledge Center -Threatpost

Knowledge Center
Educational Whitepapers
Monthly Statistics
Kaspersky Videos
Threatpost Spotlight
September, 2013

Cloud computing is loosely defined as the technology revolution that has allowed both computing power and storage to be delivered as a service, using Internet-hosted resources. It is one of the most important technological developments of the last half century – as important as the development of the Internet, without which it couldn’t exist. Today, cloud based computing resources power everything from Google’s search engine, to Facebook to online banking, flight reservation and distance learning systems.

September, 2012

Consumer devices are increasingly coming out of the box Internet-ready, and while a washing machine with its own IP address may be convenient to some and overkill to others, the reality is that this trend is more likely to boom than bust in the coming months and years. The other reality s that the tinkerers out there are going to tinker away with these things, finding new and interesting techniques to leverage their Internet connectivity and computing ability, and eventually, perhaps inevitably, there will be exploits. As the saying goes, that Internet-connected dryer is all fun and games until someone hacks into it and ruins your delicates.

June, 2012

Eric Jackson recently wrote an op-ed in Forbes where he argued that Web 2.0 companies like Facebook may fade into obscurity like the Web 1.0 companies before them as we evolve out of the World Wide Web entirely. He argues that there will be no Web 3.0, that the Web is dying and the mobile space is its natural and inevitable successor. Whether or not the Googles and Facebooks will fade as mobile devices increasingly become the primary tools on which we access the Internet is debatable. However, the fact that mobile devices are rapidly replacing the traditional desktop computer is beyond dispute.

Likewise, as consumers migrate to mobile devices, so go the cybercriminals and security industry as well, and as a recent study found, the adoption of mobile devices seems to be outpacing our ability to secure those devices.

May, 2012

The scarcity of Mac-based malware has reinforced the misconception in some circles
that Apple’s machines are somehow invulnerable to the traditional Windows-style of
malware infection. This has been a contentious issue in the security industry for the
better part of the last decade, but to say that Apple has been malware-free would be
untrue. The Mac platform has been dealing with small and somewhat insignificant
malicious programs since the early 80’s, which you can read all about in our latest
slideshow. For years though, experts have predicted an end to Apple’s relative security
cake walk.  Stay current and informed on Mac Malware, download this Spotlight today.

April, 2012

The line between our physical and digital lives is becoming increasingly obscure as we
upload more and more of our personal and professional information onto the Internet.
The concept of a reasonable expectation of privacy is changing dramatically and the
places where that expectation once existed are disappearing, compelling some to
argue that term “online privacy” has become an oxymoron.  Download today.

March, 2012

Whether you’re selling software, running for president, or building a botnet to push
phony-pharmaceuticals, social networks are enormously valuable and dynamic
tools for getting your message out. Enterprises, as well as their employees, have
realized this, and have joined the crush to stake out a place to promote their brands,
services and products on the most successful social networks.
Unfortunately, many of the very elements that make these networks invaluable tools
for publishing, marketing, customer interaction and public relations also make social
networks powerful and irresistible markets for cybercriminals. What do you need to
know about the security implications of social networks? This Threatpost Spotlight will
tell you.

March, 2012

Most of us continue to buy our goods the old fashioned way: using credit cards (or cash) at traditional point of sale terminals, or (increasingly) online. But just off the radar, a whole new world of mobile technologies is ramping up for the purpose of replacing your credit cards – indeed: your whole wallet – with sleek mobile applications stored on a device that’s already indispensible: your phone.

As with any headlong rush into a new technology, however, there are questions being raised about the security implications of mobile payments in all its forms, and concerns that feature adoption is outstripping security on many new payments platforms. Europe) to make purchases with their phones and mobile. It’s still very in the game but, as Threatpost has discovered, there’s already good evidence that warnings about security holes in mobile payments platforms aren’t unwarranted. 

Download  our Spotlight Series to find out what you need to know about mobile payments.

February, 2012

The Stop Online Piracy Act (SOPA) is a controversial bill introduced by U.S. Representative Lamar Smith (R-TX) to the House of Representatives. Its stated purpose is, “To promote prosperity, creativity, entrepreneurship, and innovation by combating the theft
of U.S. property, and for other purposes.” While attempts at reigning in digital piracy receive wide-spread support from the American public, the methods of doing so that SOPA would establish are concerning to many.  
Download this Spotlight to understand what SOPA is and why it matters.

December, 2011

As the year draws to a close, we’ve compiled our list of the Top Security Stories of 2011, presented here in no particular order. These are the issues that shook the world’smarkets and kept us awake at night. If there’s a lesson here, it’s that cybersecurity challenges aren’t going away anytime soon. In fact, as we look forward to 2012, about the only thing that could quell the continuing battle to secure technology system is if the Mayans turn out to be right.  And none of us is rooting for that.

December, 2011

What will 2012 bring? We can’t know for sure. Recent years have taught us that, when it comes to computer security, one should expect to be surprised. However, it’s equally true that in the realm of computer security, “what’s past is prologue,” as Shakespeare famously wrote. In other words: the events of he past year have helped to set the stage for the big events (and news stories) of 2012. What are those likely to be?  Download to learn Threatpost’s predictions ofof 2012 security trends.

October, 2011

Blaring headlines that decry insider attacks against their employers are nothing new. In fact, some of the biggest and most damaging data breaches in recent memory were ultimately linked back to rogue employees of large firms.
You could be forgiven for thinking that malicious insiders were a threat felt mostly by enterprises and large enterprises. After all, the Threatpost list of Infamous Insiders features no shortage of Fortune 500 firms. But if you assumed that rogue and malicious
insiders were an enterprise problem only, you’d be dead wrong. Small businesses, too, are frequent victims of insider attacks and other forms of data theft, and are just as likely to be attacked as large, well-known firms. This Spotlight offers some guidelines that businesses can use to help avoid being a victim.

September, 2011

Security and privacy experts have been warning about the fundamental flaws in the certificate authority system for more than 15 years now, but for the most part those warnings have gone unheeded. The system is set up so that any CA has the ability to issue a certificate for any site on the Web, and users have virtually no visibility into the process and no sense of which CAs are trustworthy.  Download this Spotlight to learn more about certificate authority compromises.

September, 2011

For most of the last two decades, industrial and manufacturing firms have lived in something of a security bubble. As enterprise networks struggled to stay on top of denial of service attacks and malicious outbreaks, manufacturers, utilities and others that rely on industrial control software comforted themselves that, when it came to attacks on industrial firms, things were different.  Download this Spotlight to learn key facts about threats in industrial manufacturing.

July, 2011

If Firewalls, antivirus software and intrusion detection tools keep out stealthy attackers,
how does a company square off against rogue insiders?

That’s a pressing question and one that’s garnering more attention as the number of high profile insider
attacks mounts, and as government and private sector regulators take steps to clamp
down on malicious insiders.

To help you understand the insider threat better, Threatpost has put together this Spotlight on insider threat attacks that can help you begin to tailor your protections and policies to stop malicious insiders

July, 2011

A Threatpost survey reveals the emerging threat of attack from trusted employees and the inconsistent ways companies are fighting back. Modern businesses thrive on increased collaboration and information sharing. As a result, today’s enterprises are granting employees of all levels access to a growing number of network resources, enterprise applications and other sensitive IT assets as a way to promote greater worker efficiency and improved business performance.
But there’s a downside . . . .  download Threatpost’s Insider Threats Survey to see the ways attacks from within are vexing the enterprise and where IT security efforts need to be improved.