Showing posts with label Kaspersky Lab. Show all posts
Showing posts with label Kaspersky Lab. Show all posts

Thursday, August 8, 2019

Apple under investigation for unfair competition in Russia


MOSCOW - Apple is under investigation in Russia following a complaint from cybersecurity company Kaspersky Lab and may be abusing its dominant position in smartphone apps, Russia's anti-monopoly watchdog said on Thursday.

Watchdog FAS said it was investigating why a new version of Kaspersky Lab's Safe Kids application had not been updated on the Apple operating system, resulting in a significant loss in functionality for the app.

It said Apple had released an updated version of its own app, Screen Time, which had similar functions to the Kaspersky program.

source: news.abs-cbn.com

Tuesday, January 29, 2019

Hacks and facts: 10 things you didn't know about data privacy


LONDON - From hackers exposing private information online to the handling of users' data by internet giants, online privacy has become a matter of growing concern for countries, companies and people alike.

On Monday, countries around the world marked Data Privacy Day, also known as Data Protection Day - an initiative to raise awareness of internet safety issues.

Here are 10 facts about online privacy:

* Less than 60 percent of countries have laws to secure the protection of data and privacy.

* Europe's data protection regulators have received more than 95,000 complaints about possible data breaches since the adoption of a landmark EU privacy law in May.

* More than one in two respondents to a 2018 global survey by pollster CIGI-Ipsos said they had grown more concerned about their online privacy compared to the previous year.

* Almost 40 percent of respondents to another survey by cyber-security firm Kaspersky Lab said they did not know how to protect themselves from cybercrime.

* A survey of tech professionals by security key maker Yubico suggested experts might not live up to safety standards. It found almost 70 percent of respondents shared passwords with colleagues.

* More than half reused an average of five passwords across their work and personal accounts.

* About 4 percent of people targeted by an email phishing campaign would click on it.

* In 2017, almost 17 million U.S. consumers experienced identity fraud - the unauthorised use of personal information, such as credit card data, for financial gain.

* Data breaches carried out by hackers are expected to go up 22 percent annually, exposing some 146 billion records, including personal information such as name, address and credit card numbers by 2023.

* Data breaches cost companies worldwide almost $4 million on average for every incident. 

source: news.abs-cbn.com

Friday, December 1, 2017

UK cyber agency targets Kaspersky in warning on Russian software


Britain's main cyber security agency on Friday warned British government agencies to avoid using anti-virus software from Russian companies, the latest in a series of moves targeting Moscow-based security software maker Kaspersky Lab.

In a letter to departmental permanent secretaries, the director of the UK National Cyber Security Centre, Ciaran Martin, said Russian-made anti-virus software should not be used in systems containing information that would harm national security if it was accessed by the Russian government.

He said his agency is in talks with Kaspersky Lab to develop a system for reviewing its products for use in Britain.

Kaspersky's anti-virus software was banned from U.S. government networks earlier this year on concerns the company has close ties to intelligence agencies in Moscow and that its software could be used to enable Russian spying.

"We are in discussions with Kaspersky Lab ... about whether we can develop a framework that we and others can independently verify,” Martin said in the letter, which was publicly released.

Kaspersky Lab said in a statement that it looked forward to working with the NCSC on the issue.

Kaspersky has strongly denied allegations about the safety of its products or ties to the Russian government, saying it has become a scapegoat in the midst of rising tensions between Washington and Moscow.

source: news.abs-cbn.com

Friday, November 17, 2017

Kaspersky blames NSA hack on infected Microsoft software


Embattled computer security firm Kaspersky Lab said Thursday that malware-infected Microsoft Office software and not its own was to blame for the hacking theft of top-secret US intelligence materials.

Adding tantalizing new details to the cyber-espionage mystery that has rocked the US intelligence community, Kaspersky also said there was a China link to the hack.

The Moscow-based anti-virus software maker, which is now banned on US government computers because of alleged links to Russian intelligence, confirmed that someone did apparently steal valuable National Security Agency programs from an NSA worker's home computer, as first reported by the Wall Street Journal on October 5.

According to the Journal, the person had top secret files and programs from the NSA hacking unit called the Equation Group on his computer, which was also using Kaspersky software protection.

They believe that Russian spies used the Kaspersky program as a back door to discover and siphon off the files, reportedly causing deep damage to the NSA's own cyber-espionage operations.

US allegations that Kaspersky, which sold more than $600 million of anti-virus software globally in 2015, knowingly or unknowingly helped Russian intelligence in the theft have effectively killed its US business and hurt its worldwide reputation.

Kaspersky software 'disabled'

Using its own forensic analysis, Kaspersky said the breach of the NSA worker's computer took place between September and November 2014, rather than 2015 as the Journal reported.

Kaspersky said what was stolen included essential source code for some Equation Group malware, as well as classified documents. Based on the materials, it said the computer appeared to belong to someone involved in creating malware for the Equation Group.

The company claimed, however, that the computer was infected by other malware, including a Russian-made "backdoor tool" hidden in Microsoft Office.

Kaspersky said that the malware was controlled from a computer server base in Hunan, China, and would have opened a path into the computer for anyone targeting an NSA worker.

"Given that system owner's potential clearance level, the user could have been a prime target of nation-states," it said.

Kaspersky's own software would have detected that malware, the company said, except that its software had been turned off.

"To install and run this malware, the user must have disabled Kaspersky Lab products on his machine," it claimed.

pmh/jh

source: news.abs-cbn.com

Thursday, September 14, 2017

Trump administration orders purge of Kaspersky products


WASHINGTON - The Trump administration on Wednesday told U.S. government agencies to remove Kaspersky Lab products from their information systems, saying it was concerned the Moscow-based cyber security firm was vulnerable to Kremlin influence.

The decision represents a sharp response to what U.S. intelligence agencies have described as a national security threat posed by Russia in cyberspace, following an election year marred by allegations that Moscow weaponized the internet in an attempt to influence its outcome.

In a statement, Kaspersky Lab rejected the allegations, as it has done repeatedly in recent months, and said its critics were misinterpreting Russian data-sharing laws that only applied to communications services.

“No credible evidence has been presented publicly by anyone or any organization as the accusations are based on false allegations and inaccurate assumptions,” the company said.

The Department of Homeland Security issued a directive to federal agencies ordering them to identify Kaspersky products on their information systems within 30 days and begin to discontinue their use within 90 days.

“The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks,” the agency said in a statement.

The department said it would provide Kaspersky with the opportunity to submit a written response to address the allegations. The agency said other entities claiming commercial interests affected by the directive could also submit information

Kaspersky Lab has repeatedly denied that it has ties to any government and said it would not help a government with cyber espionage.

However, the company has not been able to shake off the allegations. Last week, Best Buy Co (BBY.N), the No.1 U.S. electronics retailer, said it was pulling Kaspersky Lab’s cyber security products from its shelves and website.

Rob Joyce, the White House cyber security coordinator, said Wednesday at the Billington CyberSecurity Summit that the Trump administration made a “risk-based decision” to order Kaspersky Lab’s products removed from federal agencies.

Asked by Reuters whether there was a smoking gun showing Kaspersky Lab had provided intelligence to the Russian government, Joyce replied: ”As we evaluated the technology, we decided it was a risk we couldn’t accept.”

Some cyber security experts have warned that blacklisting Kaspersky Lab could prompt a retaliation from Russian President Vladimir Putin. Joyce said those concerns were a factor but that a “tough decision” ultimately had to be made to protect government systems.

The direct financial impact of the decision will likely be minimal for Kaspersky Lab, one of the world’s leading antivirus software companies, which was founded in 1997 and now counts over 400 million global customers.

Federal contracting databases reviewed by Reuters show only a few hundred thousand dollars in purchases from Kaspersky, and an employee told Reuters in July the company’s federal government revenue was “miniscule.”

But Kaspersky also sells to federal contractors and third-party software companies that incorporate its technology in their products, so its technology may be more widely used in government than it appears from the contracting databases, U.S. officials say.

The decision by the Trump administration came as the U.S. Senate was planning to vote as soon as this week on a defense policy spending bill that includes language that would ban Kaspersky Lab products from being used by U.S. government agencies.

Democratic Senator Jeanne Shaheen, who had led efforts in Congress to crack down on Kaspersky Lab, applauded the Trump administration’s announcement.

“The strong ties between Kaspersky Lab and the Kremlin are alarming and well-documented,” Shaheen said, adding that she expected Congress to act soon to reinforce the decision by passing legislation.

Eugene Kaspersky, the company’s co-founder and chief executive, attended a KGB school, and the company has acknowledged doing work for the Russian intelligence agency known as the FSB. But he has adamantly denied charges his company conducts espionage on behalf of the Russian government.

source: news.abs-cbn.com

Wednesday, August 9, 2017

How safe is free public Wi-Fi?


President Rodrigo Duterte recently enacted a law providing free internet access in public places nationwide.

The law, which requires a mandated minimum internet speed per user of two megabits per second (2 Mbps) is expected to get more Filipinos online. However, logging in to a free Wi-Fi access may carry security risks.

Cyber security firm Kaspersky Lab has identified free Wi-Fi as one of the biggest security risks for computer and mobile internet users.

A 2016 survey of the firm revealed that 71 percent of respondents said they use unsecured public Wi-Fi in bars and fastfood restaurants.

Meanwhile, 15 percent use free public Wi-Fi for bank transactions and online payments.

Department of Information Communication Technology (DICT) Asst. Sec. Allan Cabanlong admitted that although there are risks in using free public Wi-Fi services, the government ensured that its project is safe for public use.

"We made sure that the free Wi-Fi of the DICT is only 100 mbps... For the hacker to use it, it may be questionable because 100 mbps is not enough to hack someone," he said.

Cabanlong advised the public to be wary of the public Wi-Fi providers by checking the names and spellings.


-ANC Future Perfect, August 09, 2017

source: news.abs-cbn.com

Wednesday, April 20, 2016

How online data-sharing can ruin marriages, career

MANILA -- While social media platforms have been helpful in connecting people from different parts of the world, they may also wreck relationships and jobs if used mindlessly.

According to a study by global cybersecurity company Kaspersky Lab involving 12,000 people worldwide, 28% of those surveyed have experienced sharing confidential information by accident, while 16% said they willingly disclosed "secrets" online.

These include photos of themselves (45%), contact details (42%), photos of another person (32%), sensitive personal details (30%) and work-related data (20%).

Furthermore, one in every six respondents (16%) admitted to have shared confidential information, 9% communicated private information about another person, and 8% shared sensitive financial details.

Meanwhile, a total of 28% admitted to have accidentally shared confidential data and one in 10 respondents have suffered as a result.

The consequences included losing friends (20%), being bullied (17%), suffering financial loss (15%), ruining relationships (13%) and being dismissed from their job (13%).

Despite this, 13% still do not take any precaution to keep their online activities and information safe, and only 39% double-check all messages and posts before clicking send.





Here are some tips for a safer social media sharing from Kaspersky Lab

1. Check your security settings 

When you join any social networking site, the first thing that you must remember is to check your privacy settings. 

This includes checking what data can be seen by your friends, followers, and the general public. You should also check the rights of the social network's operator in terms of your personal data.


 2. Be mindful of your posts

Always remember your manner and netiquette before posting anything. You should be mindful before sharing photos, videos, and thoughts that may offend other people.

It is also important to be cautious in using services that will automatically publish your current location.

3. Determine the authenticity of a friend

Verifying the profile of a person before adding him to your social media circle is a must. Better yet, just add those who you know personally.

4. Protect your photos, personal info

Identity theft is one of the biggest threats on the Internet. There have been cases in which cyber-criminals have created fake profiles and used them to blackmail their victims. Thus, keep your profile secure by setting your privacy within your close relatives and friends.

5. Prevent malware attacks
Cyber-criminals have also learned to utilize social networking sites to infiltrate vulnerable users and steal important information.

In such cases, users receive an invitation from a friend to view a photo album or to click on a link to watch a video. Clicking on the link, however, may infect your PC with malware.


To read more tips on how to protect yourself online, click here

source: www.abs-cbnnews.com

Wednesday, June 24, 2015

Facebook reveals new security tool


WASHINGTON, United States - Facebook announced Tuesday it has been using a new security tool to help detect and remove malicious software for users of the world's biggest social network.

Facebook said it was working with Kaspersky Lab, bolstering a program implemented with other online security firms including ESET, F-Secure and Trend Micro.

"Thanks to the collaboration with these companies, in the past three months we have helped clean up more than two million people's computers that we detected were infected with malware when they connected to Facebook," said Trevor Pottinger, a Facebook security engineer.

"In these cases, we present a cleanup tool that runs in the background while you continue using Facebook, and you get a notification when the scan is done to show you what it found."

Pottinger said the program uses "a combination of signals to help find infections and get the malware off of your computer for good, even if the malware isn't actively spreading spam or harmful links."

Kaspersky Lab's Kate Kochetkova said in a separate blog post that Facebook users are often targeted in online fraud schemes such as "phishing," which are faked emails designed to get recipients to download malware.

"Facebook is a major aim for phishers: one in five phishing scams targets Facebook notifications," she said.

"So be vigilant when you receive emails appearing to be from Facebook: as they can be fake. There are lots of Trojans targeting Facebook users as well."

Fraudsters may also use Facebook, Kochetkova said, to "'like' weird things and promote questionable goods and services on your behalf."

source: www.abs-cbnnews.com

Saturday, December 20, 2014

Attack could cost Sony half a billion dollars: experts


LOS ANGELES - The devastating cyberattack on Sony Pictures could see the Hollywood studio lose hundreds of millions of dollars in revenue and incur massive recovery costs, experts say.

The cancellation of "The Interview," which President Barack Obama called a "mistake," has significantly escalated the potential losses of last month's hack, Hemanshu Nigam of the SSP Blue cybersecurity consultancy told AFP.

In all, he said, the crisis would lead to "a loss of income of $500 million."

The film about a fictional CIA plot to assassinate North Korean dictator Kim Jong-Un angered Pyongyang, which called it a "terrorist act."

On November 24, Sony suffered a cyberattack claimed by a group calling itself the Guardians of Peace (GOP). The FBI blamed the assault on North Korea.

The unprecedented attack paralyzed Sony's computer systems and saw five films leaked online, some of them before their theatrical release.

In addition, the personal data of 47,000 staff and other workers were put online along with other confidential documents such as the script for the next James Bond movie.

There was also a series of highly embarrassing emails from Sony bosses.

Costly in time and money

On Wednesday, as the "GOP" threatened to attack movie theaters when the film was due to come out on December 25, most major US theater chains announced they would not show it.

Within hours, Sony announced it had canceled the Christmas Day release. With that decision, "the cost has significantly gone up," Nigam said.

Sony initially said it had canceled all release plans, though on Friday it suggested it was seeking distributors for other platforms, which could see the film released either through video on demand (VoD) or as a DVD.

But Sony's production and distribution costs were estimated at $75 million. To that should be added several hundreds of millions of dollars in unearned revenue, Nigam said.

He stressed the film got enormous media exposure thanks to the crisis, and could have earned much more than otherwise if a regular theatrical release had gone ahead.

"The movie itself could have generated several hundred millions dollars given the controversy," he said.

Nigam meanwhile said cleaning up and replacing Sony's entire computer system will cost at least a few tens of millions of dollars.

Kevin Haley, senior security advisor with Symantec, also highlighted "the loss of employee productivity because they cannot get access to their computers."

"The process of cleaning them up and getting rid of their attacker... that's going to be tremendously expensive," Haley said.

To that should be added monumental legal costs.

At least two lawsuits have already been filed on behalf of present and former staff seeking compensation for the leaking of their personal data.

Sony will have to battle with its insurers to try to get some of the costs covered.

The studio will also have to take responsibility for "potential identity theft," said Roel Schouwenberg of Kaspersky Lab, noting it would cost an enormous amount of time and money.

The experts stressed it would be hard to evaluate the damage to Sony's reputation, but agreed it would be considerable.

Sony will have to reestablish relationships with people like Angelina Jolie, who was described in one leaked email as "a minimally talented spoiled brat."

All this came as Sony Pictures was already facing multiple problems.

"Sony itself is in a difficult spot," said analyst Jeff Bock of box office tracker Exhibitor Relations.

"Their slate of upcoming films aren't necessarily the strongest, and with everything in a state of confusion, it will take a while before their film division sees the light," he added.

"That may come at the expense of a lot of their high-level employees. But only time will tell."

source: www.abs-cbnnews.com

Thursday, July 10, 2014

Beware of fake World Cup streaming sites


MANILA – A security software firm has warned fans of the World Cup against websites offering free streaming of the games, saying that some of them may be fake.

In a statement, Kaspersky Lab said a number of websites that claim to stream World Cup games may be harmful, with others aimed at stealing a user’s personal information.

It said websites that ask users to download their program or provide credit card details – which are huge red flags – should be avoided.

“When you search on Internet for the live World Cup broadcast, you will sometimes find purchased advertisements that lead to fraudulent or malicious content,” said Kaspersky Lab researcher Dmitry Bestuzhev.

“When you go to the website, it asks you to download a special plugin available for all browsers. This is supposed to be the player needed to watch the online broadcast of the games. In reality, it is an adware program, which may not show you anything but will drain your computer’s resources,” he added.

Kaspersky Lab encouraged users to be on the safe side and watch the World Cup by logging through an authenticated cable service provider.

source: www.abs-cbnnews.com

Thursday, February 20, 2014

7 tips to protect your BItcoins


MANILA -- A security software firm is urging Filipinos to learn the benefits and risks of Bitcoin before using the increasingly popular online currency.

In a statement, Kaspersky Lab noted how Bitcoin transactions are fast, taking around only 10 minutes to verify a transaction. It added that it is cheap and convenient, removing the need to maintain or pay for processing fees for a credit card company.

And similar to other money transfer services, it can be transferred from another person from halfway around the world in minutes and can be converted to traditional currencies.

Here in the Philippines, there is a growing community of Bitcoin enthusiasts called Bitcoin PH. An online exchange platform called BuyBitcoin.ph lets Filipinos have easier access to the online currency.

Kaspersky Lab, however, also mentioned some risks associated with the use of Bitcoin.

Since there is no central authority controlling it, there are no rules as fare as currency regulation goes, making Bitcoin highly volatile, it said, adding that central banks from different countries have issued public warnings about risks such as money laundering.

The Bangko Sentral ng Pilipinas has also yet to create regulations and measures to protect Bitcoin users.

On top of this, Kaspersky Lab said that Bitcoin transactions are irreversible, which means users must be more careful when using such currency. This, it said, may nurture fraudulent transactions, noting that there have been more than 30 instances of stolen or illegal transfers involving Bitcoin.

"While BItcoin can be a change-maker in money remittance and trading in the Asia Pacific region, people should be more wary about the risks associated with it. There are still countries in this region where no regulations exist to bind its users, and the fact that reversals cannot be done for Bitcoin transactions must make people more concerned about using the crypto-currency," said Bryan Sat, Kaspersky Lab's business development manager for the Philippines.

"Threats are not going away, it continuously evolves and hackers embrace every opportunity there is. With Bitcoin, hackers may find it easier to get into any user's online wallet and take their Bitcoin investments rather quickly," Sat added.

Having said these, Kaspersky Lab gave the following tips on how to keep your Bitcoins safe:

1. Don't keep them all in online banks or stock exchange services. There are newer institutions run by anonymous entities, so you have no guarantee that your money will be securely held or if you can have your money back if they are robbed.

2. Even if you consider a place that has a supposedly sterling reputation, again, there are more ways to breach a digital bank than a physical bank vault. Storing small amounts for current operations is okay, though.

3. Keep this offline wallet in a separate hard drive or a computer that is not connected to the Internet, only transferring Bitcoins to your Internet-connected device when you need to complete an online transaction.

4. Bitcoin users can certainly keep their money offline using free and widely available tools like Electrum or Armory that let you store your Bitcoins in heavily encrypted cases on your own hard drive.

5. Use a strong password with these or an open-sourced password-generating software.

6. Remember to back up your wallet so you don't end up throwing out all your life savings to the nearest landfill site.

7. Know where you keep them. James Howells, an IT worker from South Wales, once discarded an old hard drive containing his wallet which had around 7,500 Bitcoins inside or the equivalent of today's $6,235,000 (over P287 million).

source: www.abs-cbnnews.com

Monday, January 27, 2014

Banking apps on Android phones most at risk of virus -Kaspersky


JERUSALEM - Banking applications on Android phones are most vulnerable to cyber crime, the chief executive and co-founder of Russian anti-virus software maker Kaspersky Lab said on Monday.

Eugene Kaspersky said 99 percent of mobile attacks are towards Android-based phones, since Apple has strict controls and does not allow third-party applications.

The most disturbing trend in cyber attacks was a growing shift to mobile devices from computers and a major cyber attack using mobile phones was bound to happen since cellular users are not properly protected, he told Reuters.

"I expect something really bad to happen to change people's minds and awareness," he said, noting that it took the Chernobyl virus in 1998 for people to properly protect their computers.

"Cyber crime is moving to mobile but people are not aware. It's still not as big as computer crime but it's growing fast. The trend is a very dangerous situation," he said at a cyber-tech conference in Israel, where he wants to open a research and development lab.

Kaspersky makes one of the top-selling anti-virus programmes in the United States, where it has gained market share in recent years against products from Symantec Corp, Intel's McAfee and Trend Micro.

He said it was hard to determine where most cyber attacks are coming from geographically but cyber criminals typically speak Chinese, Spanish, Portuguese and Russian.

source: www.abs-cbnnews.com

Thursday, December 19, 2013

5 security tips for gamers


MANILA – Security software firm Kaspersky Lab shared some tips for gamers as it released data about the number of gaming-related attacks globally.

In a statement, Kaspersky Lab said it recorded a total of 11.7 million attacks on gamers in 2013, with users hit by 34,000 gaming malware every day on average.

Russian gamers were most at risk with more than 8 million attempts on them by hackers, followed by Vietnam (503,947), China (376,058), India (207,245), Spain (139,078), Poland (127,583), Turkey (121,164), Taiwan (97,843), Thailand (92,914) and Italy (75,155).

The Philippines was not included in the list.

As many people are expected to receive games as presents this Christmas, Kaspersky Lab urged users to take the right precautions.

The security software firm noted several types of attacks, such as a fake Minecraft tool that promises to let users ban other players; a fake Grand Theft Auto V download that claims to let users access the game for free; and the traditional phishing, which lures users into handing over data or money with the promise of discounts or cheap gaming goods.

“Gaming has an ever increasing fanbase, which means that the number of potential victims for cyber criminals is rising as well,” said Christian Funk, a senior virus analyst from Kaspersky Lab’s Global Research and Analysis Team.

“Cybercriminals are putting a lot of effort into their attacks and we can see a surge in their sophistication. During Christmas when a lot of new games are being released, gamers need to be even more attentive to stay secure,” Funk added.

Here are Kaspersky Lab’s five tips for gamers:

1. Don’t click through on any offers that look too good to be true, whether from your inbox or on social networks like Facebook or Twitter. If an offer comes through and looks legitimate, ensure the sender is trusted before hitting a link or handing over any details. If in doubt, contact the company the sender claims to be from.

2. Use strong and varied passwords across your gaming accounts. As we’ve seen this year, gaming companies get hacked and logins are leaked. If you don’t have different credentials, stealing one set could be a cybercriminal’s key to open all your different accounts using that same password. Consider investing in a password manager as it will give you simple, smart protection.

3. Get a good quality antivirus. With rafts of gaming malware out there and the increasing sophistication of malicious software, you’ll need some level of protection. You’ll need an antivirus that goes beyond signature-based detection to look at file reputation if you want to stop the smartest malware from getting on your system.

4. Be careful whom you befriend. It’s easy to make friends in virtual worlds today, but not all are doing so innocently. Beware of anyone who asks for your personal details as they may want to do more than just contact you.

5. Only download titles from legitimate sellers. If you’re downloading an illegal copy of a game, you aren’t just breaking the law. You also risk getting malware on your machine as crooks often disguise malicious software as game files.

source: www.abs-cbnnews.com

Thursday, October 10, 2013

Using public Wi-Fi? Be careful


MANILA – Security software firm Kaspersky Lab warned smartphone, tablet and laptop users of the risks of public Wi-Fi hotspots, saying that they may fall prey to cybercriminals.

According to Kaspersky Lab, data sent through public Wi-Fi can be easily intercepted, letting cybercriminals access users’ banking credentials, banking passwords and other valuable information.

Citing a recent survey, it said 70% of tablet owners and 53% of smartphone users said they use public Wi-Fi hotspots.

Here are some tips from Kaspersky Lab’s team of Internet security experts on using public Wi-Fi hotspots:

1. Be aware – Public Wi-Fi is inherently insecure, so be cautious.

2. Remember, any device could be at risk – Laptops, smartphones and tablets are all susceptible to wireless security risks.

3. Treat all Wi-Fi links with suspicion – Don’t just assume that the Wi-Fi link is legitimate. It could be a bogus link that has been set up by a cybercriminal that is trying to capture valuable, personal information from unsuspecting users. Question everything and don’t connect to an unknown or unrecognized wireless access point.

4. Try to verify the legitimacy of a wireless connection – Some bogus links that have been set up by malicious users will have a connection name that’s deliberately similar to the coffee shop, hotel or venue that’s offering free Wi-Fi. If you can speak with an employee at the location that’s providing the public Wi-Fi connection, ask for information about their legitimate Wi-Fi access point, such as the connection’s name and IP address.

5. Use a VPN (virtual private network) – By using a VPN when you connect to a public Wi-Fi network, you’ll effectively be using a “private tunnel” that encrypts all of your data that passes through the network. This can help prevent cybercriminals that are lurking on the network from intercepting your data.

6. Avoid using specific types of websites – It’s a good idea to avoid logging into websites where there’s a chance that cybercriminals could capture your identity, passwords or personal information such as social networking sites, online banking services or any websites that store your credit card information.

7. Consider using your mobile phone – If you need to access any websites that store or require the input of any sensitive information, including social networking, online shopping and online banking sites, it may be worthwhile accessing them via your mobile phone network instead of the public Wi-Fi connection.

8. Protect your device against cyberattacks – Make sure all of your devices are protected by a rigorous anti-malware and security solution and ensure that it’s updated as regularly as possible.

source: www.abs-cbnnews.com

Thursday, September 12, 2013

What causes data theft in the workplace?


MANILA – A recent survey conducted by B2B International in collaboration with Kaspersky Lab showed the main causes of data theft in the workplace.

According to the Global Corporate IT Security Risks 2013 survey, software vulnerabilities is one of the top reasons behind internal IT security incidents, with 39% of companies reporting this issue.

(Click here to know the details of the survey.)

Employee error, however, is equally high at 32%. Around 30% of companies participating in the survey reported incidents involving the loss or theft of mobile devices at the fault of the employee, while 19% said intentional leaks were committed by their staff.

Meanwhile, about 7% of respondents said employee actions caused leakages of confidential corporate data.

Given these, Kaspersky Lab urged companies to educate employees about IT threats, enforce appropriate security policies, and use specialized security software solutions.

source: www.abs-cbnnews.com

Tuesday, January 15, 2013

Kaspersky finds 'Red October' virus targeting Europe

PARIS, France - Kaspersky Lab said Monday it had identified a new computer virus it dubbed "Red October" targeting eastern European countries that appeared to be collecting classified files using NATO and EU encryption.

"The primary focus of this campaign targets countries in Eastern Europe, former USSR Republics, and countries in Central Asia, although victims can be found everywhere, including Western Europe and North America," said the maker of anti-virus software in a statement.

Kaspersky Lab said "there is strong technical evidence to indicate the attackers have Russian-speaking origins."

Red October, which has been active since at least 2007, appears to collect files encrypted with software used by several entities from the European Union to NATO, it added.

Kaspersky said Red October also infected smartphones and collected login information to test on other systems.

Red October has what Kaspersky Lab called a unique "resurrection" module that hid in Adobe Reader and Microsoft Office programs that allowed the attackers to regain access if the virus was discovered and removed.

In addition to diplomatic and governmental agencies of various countries across the world, Red October also targeted research institutions, energy and nuclear groups, and trade and aerospace targets, added Kaspersky Lab.

Founded in 1997, Kaspersky Lab employs more than 2,300 specialists and is a leading IT security and anti-virus software company.

source: abs-cbnnews.com