Some Tips on Safely Transferring Money
A series of security tips and guidelines to follow if you are planning to conduct money transfers online.
“We are what we pretend to be, so we must be careful about what we pretend to be.” ― Kurt Vonnegut
161 articles
A series of security tips and guidelines to follow if you are planning to conduct money transfers online.
The OpenSSL Heartbleed bug that could expose passwords, communications, and encryption keys continues to dominate news headlines across the security industry
Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft’s end of security support for Windows XP
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
UPDATE: A previous version of this article stated – citing a list on Github – that users on a site called HideMyAss were affected by Heartbleed. A spokesperson from that
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
In the news this month: more transparency reports, Microsoft zero days, data breaches, and NSA revelations. WhatsApp – the popular global messaging service – is acquired by Facebook, much to
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
A number of Samsung’s popular Galaxy devices reportedly contain an alleged backdoor that could give attackers remote control of vulnerable handsets, effectively turning successfully exploited phones into mobile spying machines.
This is a story of when security works, but it may also be the story of a new way to exploit the internet for dirty money: As you can easily
Late on a Friday afternoon in the middle of February Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of February 2014. Download podcast for offline listening
PUNTA CANA – The second day of Kaspersky Lab’s Security Analysts Summit was organized into three tracks, which were great for the conference attendees, but also means this article will
PUNTA CANA – Security professionals, law enforcement officials, and journalists converged on the Dominican Republic’s Punta Cana resort town for Kaspersky Lab’s extravagant Security Analysts Summit, which came on the
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
PUNTA CANA–A hacking group likely backed by an unknown national government has been targeting government agencies, embassies, diplomatic offices and energy companies for more than five years in what Kaspersky
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of January 2014. Download podcast for offline listening
While the breach itself seemed only to impact those of us in the United States, chances are you’re aware that the American retail giant <a href=”http://threatpost.com/target-attackers-took-11-gb-of-data-researchers-say/103691″>Target suffered an enormous data
To summarize Costin Raiu, the director of Kaspersky Lab’s research arm, the vast majority of malicious files are what he calls crimeware — computer programs deployed by cybercriminals seeking to
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some