{"id":3139,"date":"2014-04-03T09:59:45","date_gmt":"2014-04-03T13:59:45","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3139"},"modified":"2020-02-26T18:58:25","modified_gmt":"2020-02-26T14:58:25","slug":"marchroundup","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/marchroundup\/3139\/","title":{"rendered":"March Monthly Roundup"},"content":{"rendered":"<p>March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive map of online threats to tips on using our newest safe broswer app, we did our part to keep you in the know. So if you missed \u00a0any of our posts be sure to catch up now with our monthly roundup of our top March highlights.<\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111156\/monthly-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4376\" alt=\"monthly\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/04\/05111156\/monthly-1.jpg\" width=\"640\" height=\"420\"><\/a><\/b><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-safe-browser-for-windows-protects-microsoft-based-smartphones\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Safe Browser for Windows Protects Microsoft-based Smartphones<\/a><\/p>\n<p>As new devices and new operating systems come to the market, the list of threats against them continues to grow. That\u2019s why Kaspersky Lab is now offering a safeguard for smartphones that run on Microsoft\u2019s mobile OS system. The\u00a0<a href=\"http:\/\/www.windowsphone.com\/en-us\/store\/app\/kaspersky-safe-browser\/cbd73e89-9270-4a01-bb22-afbc67002a09\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Safe Browser for Windows Phone<\/a>\u00a0app is designed to protect users from the latest mobile threats, specifically against phishing scams (especially those that revolve around the use of fake sites), while simultaneously offering a set of parental safeguards to restrict the mobile-based Internet activities of children. It evolves as quickly as cybercriminals, because it is constantly updated with solutions to the newest threats through the cloud-based Kaspersky Security Network. \u201cSmartphones are becoming an essential part of modern life and the web browser is one of the most popular features,\u201d said Victor Yablokov, the head of mobile product line at Kaspersky Lab. \u201cHowever, even the most tech-savvy web user may sometimes struggle to distinguish fake sites from the real thing. Now, Kaspersky Safe Browser for Windows Phone is here to help, providing automatic protection against fraudulent and inappropriate sites.\u201d<\/p>\n<div class=\"pullquote\">Kaspersky Safe Browser for Windows Phone helps provide automatic protection against fraudulent and inappropriate sites.<\/div>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/linux-vulnerable-to-apple-cert-bug-sort-of\/\" target=\"_blank\" rel=\"noopener nofollow\">Linux Vulnerable to Apple Cert Bug (Sort of)<\/a><\/p>\n<p>In the middle of February Apple quietly issued a fix for a critical certificate validation bug in iOS that had the ability to give attackers the capability to spy on supposedly secure communications. The bug not only affected Apple\u2019s mobile\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/keyboard-spies-now-on-iphones\/\" target=\"_blank\" rel=\"noopener nofollow\">iOS<\/a>\u00a0operating system,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/critical-ios-macos-bug-can-expose-your-confidential-data-update-now\/\" target=\"_blank\" rel=\"noopener nofollow\">but its traditional OSX operating system as well<\/a>. Heads really turned when it became apparent that\u00a0<a href=\"https:\/\/threatpost.com\/gnutls-certificate-verification-flaw-exposes-linux-distros-apps-to-attack\/104614\" target=\"_blank\" rel=\"noopener nofollow\">an eerily similar bug affected GnuTLS<\/a>, a free and open-source piece of software used to implement encryption in various Linux distributions and other platforms. People cried sabotage as experts began noticing that the known coding errors would have been very difficult to miss in the coding review process.\u00a0Bruce Schneier, one of the world\u2019s premiere cryptography and security experts asked, \u201cWas this done on purpose? I have no idea. But if I wanted to do something like this on purpose, this is exactly how I would do it.\u201d<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/tor-faq\/\" target=\"_blank\" rel=\"noopener nofollow\">Demystifying Tor<\/a><\/p>\n<p>There has recently been a large peak of interest in Tor, but do you know what it is?<\/p>\n<p>Tor is basically unrestricted, free software operating on the Internet that allows its users to remain anonymous while they are active online. Network traffic is completely anonymous with Tor: it is impossible to identify the user\u2019s IP, making it impossible to determine who the user is in real life. Therefore, no action, like the publication of posts in Tor, can be linked to a particular individual. How is total anonymity possible? All network traffic (i.e. any information) is encrypted repeatedly as it passes through several network nodes, or routers, on its way to Tor. No network node knows either the source of the traffic or the destination or its content. This ensures a high level of anonymity, making it impossible to determine who is behind the network activity, i.e. a real person. Aside from normal users, this technology also attracts the attention of cybercriminals who have started using Tor as an underground market, popularizing the now infamous Bitcoin while also using it to host malicious infrastructure like <a href=\"https:\/\/www.securelist.com\/en\/blog\/208214185\/ChewBacca_a_new_episode_of_Tor_based_Malware\" target=\"_blank\" rel=\"noopener nofollow\">ChewBacca<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.securelist.com\/en\/blog\/8184\/The_first_Tor_Trojan_for_Android\" target=\"_blank\" rel=\"noopener nofollow\">first Tor Trojan for Android<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/\" target=\"_blank\" rel=\"noopener nofollow\">Look at Cyberwar With Your Own Eyes: An Interactive Map of Online Threats<\/a><\/p>\n<p>In today\u2019s world, it takes minutes for new malware applications or spam to be distributed, but now you can see the scale and magnitude of the problem with your own eyes thanks to <a href=\"http:\/\/cyberwar.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">our map<\/a> depicting malware epidemics in real time. Which country gets more spam in the morning: Germany or USA? Who more readily clicks on malicious links: Russians or Japanese? Which country leads in terms of malware infection rates?\u00a0Our map lays all this information out for you. Interactive in nature, it allows you to move around the globe while showing you the different threats that currently exist and what the most infected countries are. Most importantly though, it gives you the opportuity to <a href=\"http:\/\/free.kaspersky.com\/?redef=1&amp;THRU&amp;reseller=cybermap_sm\" target=\"_blank\" rel=\"noopener nofollow\">check your PC for viruses free of charge<\/a>\u00a0 in to prevent further exposure to malware by clicking on the \u2018Check my PC\u2019 button offered.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-kaspersky-protection-with-the-new-versions-of-google-chrome\/\" target=\"_blank\" rel=\"noopener nofollow\">How to Use Kaspersky Protection With The New Versions of Google Chrome<\/a><\/p>\n<p>Google, which recently announced that the Chrome browser will now be working with extensions only from the official Chrome Web Store, in the hopes of better protecting users against vulnerable, malicious, and annoying extensions, plug-ins, and other additions, which can override user\u2019s settings and\/or alter the user experience in undesired ways.\u00a0However, <a href=\"https:\/\/www.kaspersky.com\/products\" target=\"_blank\" rel=\"noopener nofollow\">as the developer of security products<\/a>, we faced a problem here: how do we protect our customers against\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/?s=phishing&amp;submit=Search\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a>, malicious web sites,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/keylogger\/\" target=\"_blank\" rel=\"noopener nofollow\">key loggers<\/a>\u00a0and other threats when, starting from version 33, the browser won\u2019t work with our old extensions? We\u2019re now offering a new Google Chrome plug-in \u2014\u00a0<a href=\"http:\/\/support.kaspersky.com\/10861\" target=\"_blank\" rel=\"noopener\">Kaspersky Protection<\/a>. This extension is bundled with the recently released\u00a0<a href=\"http:\/\/support.kaspersky.com\/10235\" target=\"_blank\" rel=\"noopener\">patch F<\/a>\u00a0and includes three parts: Virtual keyboard, Safe Money and Block dangerous websites module, making your Internet browsing even more safe and secure.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-the-airport-security-scanner\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacking The Airport Security Scanner<\/a><\/p>\n<p>A presentation on the subject of Airport cybersecurity was recently given at the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/sas-day-one-kaspersky-showcases-company-industry-talent\" target=\"_blank\" rel=\"noopener nofollow\">SAS 2014<\/a>\u00a0Conference by Qualys researchers Billy Rios and Terry McCorkle, who spent time exploring a very important system of the airport protection perimeter \u2013 an X-Ray introscope.\u00a0This device is controlled by a special key panel, and is essentially a highly specialized scanner connected to an ordinary PC running software on top of a typical Windows installation.\u00a0Upon a deeper dive of the software, Rios and McCorkle discovered the computer was running Windows 98, which is 15 years old and no longer supported by Microsoft, causing worry over how many\u00a0<a href=\"https:\/\/threatpost.com\/category\/microsoft\" target=\"_blank\" rel=\"noopener nofollow\">exploitable and unpatched vulnerabilities<\/a>\u00a0still exist in it. They also found out the system focused heavily on physical security while neglecting computer security. Although this raised some alarm, airport security zone computers are isolated from the Internet, making it very difficult to hack them, and this test was conducted on just one, older system. Airports do have other security measures in place so there is no need to truly panic, but this has taught us that traditional security measures like administrative access control and \u201cairgapping\u201d (network isolation) are no replace for a dedicated layer of cyber-security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive<\/p>\n","protected":false},"author":189,"featured_media":3140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,215,445],"class_list":{"0":"post-3139","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-internet-security","10":"tag-security-news"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/marchroundup\/3139\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/marchroundup\/3270\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/marchroundup\/3559\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/marchroundup\/3573\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/marchroundup\/4375\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/marchroundup\/4375\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/marchroundup\/4375\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3139"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3139\/revisions"}],"predecessor-version":[{"id":15748,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3139\/revisions\/15748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3140"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}