Read the latest news on our products and company, or find pictures, videos and audio files.
If you have any questions, would like to review any of our products or speak with one of our experts, please don’t hesitate to get in touch.
The consequences of a Distributed Denial of Service (DDoS) attack extend far beyond financial loss. These attacks also damage a company’s relationship with its customers, according to the research from Kaspersky Lab and B2B International.
The survey of over 5,000 businesses found that for 37 per cent, a DDoS attack had damaged their reputation, causing profound harm to customer trust. Losing clients and suffering reputational damage was also seen as one of the most feared consequences of a DDoS attack for over a third of businesses (39 per cent). These were seen as more problematic than the costs incurred in fighting and recovering from an attack (28 per cent) or the loss of revenue and business caused by the associated downtime
Smartphones can be compromised when charged using a standard USB connection connected to a computer, Kaspersky Lab experts have discovered in a proof-of-concept experiment. The researchers are now evaluating what the impact of such an incident might be.
Have you ever wondered how safe your smartphone and data are when you connect the device to freely available charging points at airports, cafes, parks and public transport? Do you know what, and how much data your mobile device is exchanging with these points while it’s charging? Kaspersky Lab researchers became curious and conducted research to find the answers to these questions.
Kaspersky Lab’s Global Research and Analysis Team has spent the last few months observing a wave of cyber-espionage attacks conducted by different groups across the Asia-Pacific (APAC) and Far East regions, all of which share one common feature: in order to infect their victims with malware, the attackers use an exploit for the CVE-2015-2545 vulnerability.
This weakness in Microsoft Office software was patched at the end of 2015, but still appears to be of use to these threat actors. The Platinum, APT16, EvilPost, and SPIVY groups were already known to use the exploit and they are now joined by a fairly new and previously unknown group called Danti.
Tel. +44 (0)118 909 0909