Tag Archive for: Proved

Kaspersky products proved absolute anti-ransomware effectiveness in regular AV-TEST examination


Kaspersky Endpoint Security for Business, Kaspersky Small Office Security and Kaspersky Standard passed the regular Advanced Threat Protection assessments held by AV-TEST. In the testing, all three products demonstrated complete protection against ransomware in 10 different real-life attack scenarios.

Kaspersky products proved absolute anti-ransomware effectiveness in regular AV-TEST examination

In 2022, Kaspersky solutions detected over 74.2 million attempted ransomware attacks which was 20% more than in 2021. Although law enforcement agencies globally have succeeded in disrupting APT groups such as HIVE and Emotet, malware and malicious code created by the threat actors remain in circulation. As a result, other groups can now modify the rogue code to develop new malware, making it more sophisticated and better targeted. 

In August 2023, AV-TEST examined 33 corporate and customer cybersecurity products in 10 real-life scenarios including five ransomware and five data stealer attacks. The test was made even more complicated for vendors because some malware samples were written in the Rust programming language. Rust gives attackers an advantage of high processing speed, as well as a possibility to perform multiple operations in parallel and evade statistical analysis of many malware detection systems. 

Three Kaspersky products – Kaspersky Endpoint Security for Business and Kaspersky Small Office Security for corporate users, and Kaspersky Standard for consumers were examined in the test. They gained 30 out of possible 30 points and earned the certificates: “Advanced Approved Endpoint Protection” for business security solutions and “Advanced Certified” for consumer product. 

Kaspersky solutions constantly prove their anti-ransomware effectiveness. This year, for example, in February, April  and June Advanced Threat Protection tests by AV-TEST Kaspersky received perfect scores. Previously, Kaspersky also demonstrated the highest quality of protection against complex threats in various tests in February, April, August, October and December of 2022, November of 2021, as well as in the complex research in June-August 2021.

“In 10 scenarios of the August test round, the attackers deployed a variety of techniques, such as DNS TXT Record, encrypted connections,…

Source…

Mobile devices proved vulnerable during pandemic lockdowns


According to Verizon, nearly half of businesses sacrificed mobile device security best practices to “get the job done.”

Mobile device security

Image: anyaberkut, Getty Images/iStockphoto

According to the Verizon Business Mobile Security Index 2021, the massive shift to remote work caused by the COVID-19 pandemic left many businesses knowingly vulnerable to attacks from employees’ mobile devices. Of the more than 850 businesses surveyed for the report, 40% said mobile devices are their company’s biggest IT security threat, yet 45% still sacrificed the security of mobile devices to enhance useability, meeting business needs or meeting project deadlines or productivity targets. 

Nearly one-in-four (24%) said mobile device security was sacrificed in response to restrictions put in place by the pandemic. And most IT departments (75%) succumbed to pressure from the business to lower the bar on device security.

“While businesses focused their efforts elsewhere, cybercriminals saw a wealth of new opportunities to strike,” Sampath Sowmyanarayan, chief revenue officer, Verizon Business, said in a statement. “With the rise of the remote workforce and the spike in mobile device usage, the threat landscape changed, which for organizations, means there is a greater need to hone in on mobile security to protect themselves and those they serve.”

Fewer companies reported mobile compromise

Even with lax security overall however, fewer companies reported a mobile device related compromise in 2020 compared to 2019, the report said. 

“This is the fourth year that Verizon has published this report,” the report said. “And this time the percentage of companies that admitted to having suffered a mobile-related security compromise is the lowest we’ve seen—just 23%. But hold the Champagne. Nearly one-in-four companies suffering a mobile device attack is not cause for celebration.”

Companies may not yet know they were compromised, and hackers, constantly upping their game by…

Source…

Russian hackers attack proved VPN providers were right about airport Wi-Fi


Russian hackers may have infiltrated more targets in the US than previously thought, new reports have claimed.



a group of people standing in front of a store: laptop airport security


© Provided by TechRadar
laptop airport security

More information has come to light regarding a Russian hack that targeted US airports earlier this year. The New York Times reports that the hack was carried out by a state-backed group known as “Dragonfly” or “Energetic Bear,” which has also recently been found infiltrating state and local government computer systems.

Back in March, the collective hacked into Wi-Fi systems at San Francisco International Airport and two other airports on the US’ West Coast. An analysis of the attack indicated that the hackers were likely searching for a specific individual to infect. Instead of compromising the hundreds of thousands of people that would have connected to the airports’ Wi-Fi networks, only 10 were.

VPN providers have long stressed that airport networks represent a security risk, encouraging travellers to adopt a VPN solution to keep themselves protected. Given the time and resources at the disposal of hackers like Energetic Bear, all available safeguards should be employed.

Election time

In 2016, reports of Russian interference in the US presidential election surfaced and it appears likely that the same will happen again as Donald Trump prepares to take on Joe Biden in his bid for a second term.

It is thought that Energetic Bear is attempting to infiltrate state and local government networks by first targeting random individuals before using that foothold to find more interesting targets. The hackers are unlikely to reveal their true aim until nearer to the election, however, which takes place on November 3.

Given that Energetic Bear has already claimed some high-profile targets with its previous hacks, US government officials will be on high alert. In recent years, the group stands accused of infiltrating energy systems in Germany and the US, including a nuclear power plant.

Via NYTimes

Source…

“The F-35 ‘Redefines’ How You Go to War”: This Training Exercise Proved It – The National Interest Online

“The F-35 ‘Redefines’ How You Go to War”: This Training Exercise Proved It  The National Interest Online

I’ve never seen anything like it before. My wingman was a brand new F-35A pilot, seven or eight flights out of training. He gets on the radio and tells an …

“cyber warfare news” – read more