Knowledge Center -Threatpost

Knowledge Center
Educational Whitepapers
Monthly Statistics
Kaspersky Videos
Threatpost Spotlight
June, 2011

The retail vertical is, with the hospitality industry and financial services, one of the top three most-targeted sectors by cybercriminals. No surprise, then, that retail chains have been the source of some of the largest and most costly hacks to date, including
TJX, Office Depot and Hannaford Brothers. And, with an age of mobile payments on the horizon, the opportunities for hackers to compromise retail outlets may be getting ready to explode. But why are hackers attracted to retailers?  Download Threatpost’s Retail Spotlight Series to find out.

June, 2011

Hackers want your corporate data; it’s valuable to them. 

There have been hundreds and hundreds of attacks in the last several years resulting in exposed customer/consumer data and a loss of corporate reputation.
Threatpost’s editors have pulled together this Spotlight feature as a way of informing readers about the extent of the data breach problem, what kinds of organizations attackers are targeting and what tactics the bad guys are using in order to get to the valuable data.  Download this Spotlight Series on Data Breaches to understand why your business is a target and how to stay ahead of the cybercriminals and security safe. 

May, 2011

If you have a smart phone, the chances are that you just love the convenience of the thing. When you’re lost, your phone – by now GPS enabled - can bring up Google Maps or some other program and tell you where you are and how to get where you’re going. In a strange city? Applications like Yelp will tell you about cool restaurants and stores nearby while Facebook and Twitter let you keep in touch with your followers.

April, 2011

If you love your Google Android phone and keep up with the latest in Android-related news, the chances are that you came across some scary stories recently about a new, malicious program designed to infect them. That program, dubbed DroidDream, was the subject of close coverage on

April, 2011

Any game of IT Security Boardroom BINGO in the last two years would have to include
the terms “advanced,” “persistent” and “threat.” Indeed, advanced persistent threats – or APTs – have been so much in the headlines in the last two years that the term, itself, has expanded from one that was quite specific and limited in scope to a kind of cipher – something that seems quite specific but means nothing and everything at once.

March, 2011

Privacy means different things to different people, but everyone with an interest in the Internet agrees that it’s quickly risen to the top of the list of concerns for consumers, site owners and government regulators.

January, 2011

Sometimes a big news story looks even bigger in retrospect than it does when it’s breaking. We think that’s the case with the Stuxnet worm, a sophisticated piece of malicious code that crawled its way onto the networks of power plant operators and critical infrastructure providers from India to Iran and Germany in 2010. In a series of articles, Threatpost dug deep into the functioning and origins of Stuxnet, as well as the conditions within the critical infrastructure sector that made it so effective.

December, 2010

2010 ended with a media scrum over Wikileaks and dire predictions about a new age of Internet enabled hacker-activism. But Threatpost argues that “stuff ” will trump substance in 2011 as a wave of IP enabled, loosely secured, Internet connected gadgets finally come online.

November, 2010
In a recent series of articles, Threatpost has examined some of the challenges facing the IT sector and companies, as attackers focus their attentions on buggy, vulnerable application code on PCs, mobile devices and the Web.
November, 2010

Unless you’ve been living in a cave, chances are you’ve heard plenty about the sensational leak of hundreds of thousands of pages of sensitive U.S. diplomatic cables by the expose Web site Wikileaks.  This series contains a collection of lessons for modern organizations struggling to maintain sensitive data in today’s network environment.

October, 2010
The concept of online privacy has become a sad joke in today’s environment, in which advertisers and software vendors track users’ movement 24/7, silently gather data on their online activities and use it all to sell them more products.
September, 2010
The Web has enabled users to share information on a scale that’s never been seen before. Users can post photos, videos, blog entries and virtually any other type of data they choose immediately, and many of them do so with little or no attention to security or privacy.
September, 2010
For most of recorded Internet history, Microsoft has had a firm grasp on the title of most targeted software vendor. But that has changed in the last year, as attackers have begun poking a slew of holes in Adobe products.