Who to trust: Different types of SSL certificates
A secure connection is encrypted and therefore safe; an unprotected one isn’t. Easy, right? But where do certificates come from, and what’s the difference between SSL and TLS? What does a digital...
View ArticleSynAck ransomware: The doppelgängster
Malware tends to evolve, with crooks adding new functions and techniques to help it avoid detection by antivirus programs. Sometimes, the evolution is rather rapid. For example, SynAck ransomware,...
View ArticleAn uncertain path to quantum supremacy: Notes from RSA
Uncertainty. That’s the best word to describe the feeling I had roaming around the halls of RSA Conference 2018, taking part in sessions focused on quantum computers and perceived dangers for...
View ArticleRakhni Trojan: To encrypt and to mine
We recently posted that ransomware is giving way to miners at the top of the online threat rankings. In line with this trend, the Trojan ransomware Rakhni, which we’ve been watching since 2013, has...
View ArticleKeyPass: Ravenous ransomware
We recently wrote a post about how a downloaded book or mod for a game can be accompanied by something nasty. Over the past few days, we’ve been observing a fresh case study in the shape of KeyPass...
View ArticleTransatlantic Cable Podcast, Episode 74
In episode 74 of the Transatlantic Cable podcast, some of their colleagues from overseas join Dave and Jeff to talk about travel and cybersecurity. From top tips on what to do before travelling,...
View ArticleTransatlantic Cable podcast, episode 82
An underlying theme of this week’s podcast is cheating. This comes across in many ways — from cheating the system to theft and online gaming. We kick off the 82nd edition of the Kaspersky Lab...
View ArticleTransatlantic Cable podcast, episode 95
Episode 95 of the Kaspersky Transatlantic Cable podcast touches on encryption’s power, burger joints, Google Chrome restrictions on ad-blockers, and more. To start things off, Dave and I tackle a pair...
View ArticleInternet in space: Is there Net on Mars?
By now, the Internet has reached basically all corners of the Earth — and not just its surface. Being online onboard an airplane is already old hat, and even the International Space Station has a...
View ArticleQuantum supremacy is almost uncertainly here
A quantum computer from Google solved a task that the best supercomputer in the world cannot. The news made quite a splash — and then, the report was retracted. The retraction, which the Financial...
View ArticleThe Three Little Pigs and cybersecurity
In the olden days, people paid far better attention to cybersecurity than they do now. I am sure that most of the folk tales that have survived to this day were invented specifically to prepare...
View ArticleCan you read an encrypted PDF?
According to the file format’s specifications, PDF supports encryption, using the AES algorithm with Cipher Block Chaining encryption mode. Therefore — at least, in theory — whoever encrypts a PDF file...
View ArticleTransatlantic Cable podcast, episode 132
To kick off the 132nd edition of the Kaspersky Transatlantic Cable podcast, Dave and I discuss an IoT issue for pet owners. Owners of second-generation Petnet SmartFeeders saw their feeders stop...
View ArticleQuantum computers 101
Last fall, Google announced that it had achieved quantum supremacy. If that sounds a bit abstract and not relevant to the average user, think again. What the Google team did, essentially, was use a...
View ArticleZoom 5 moves toward security
Not so long ago, we explained how to configure Zoom to make it safer to use. However, technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers...
View ArticleQuantum computers and cryptography for dummies
Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed...
View ArticleTransatlantic Cable podcast, episode 153
To start episode 153 of the Kaspersky Transatlantic Cable podcast, Dave and Jeff look back on four years of the No More Ransom initiative, of which Kaspersky is one of the four founding members. In its...
View ArticleWhat end-to-end encryption is, and why you need it
In recent years, communications services ranging from WhatsApp to Zoom have announced their implementation of end-to-end encryption. What does that mean? Well, the idea of encryption is pretty...
View ArticleTelegram security and privacy tips
Facebook’s WhatsApp recently updated its privacy policy, causing many disgruntled users to switch to rival messengers, among them Telegram. Thanks largely to this exodus, Telegram added 25 million new...
View Article7 tips for storing confidential data | Kaspersky official blog
There’s no such thing as a business that doesn’t have sensitive data. Even a small retail company has documents with employees’ personal details that legally must remain confidential, for example. Bank...
View Article
More Pages to Explore .....