Recent News around IT, Security and Communications

Every week QED Systems prepare a list of most important IT News on technology topics, including operating systems, software, security, mobile, storage and Internet, emerging tech, and technology companies such as Microsoft, Google and Apple

Wed, Jun 06, 2018
A MitM extension for Chrome
Browser extensions make our lives easier: they hide obtrusive advertising, translate text, help us choose in online stores, etc. There ar...
We all know how easy it is for users to connect to open Wi-Fi networks in public places. A lack of essential traffic encryption for Wi-Fi...
Fri, Jun 01, 2018
Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant mes...
Tue, May 29, 2018
Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous...
Mon, May 28, 2018
2018 Fraud World Cup
There are only two weeks to go before the start of the massive soccer event — FIFA World Cup. This championship has already attracted the...
Our colleagues from Cisco Talos published their excellent analysis of VPNFilter, an IoT / router malware which exhibits some worrying cha...
Wed, May 23, 2018
Spam and phishing in Q1 2018
The quarter's main topic, one that we will likely return to many times this year, is personal data. It remains one of the most sought-aft...
Wed, May 23, 2018
Backdoors in D-Link's backyard
If you want to make the world safer, start with the smart things in your home. Or, to be more specific, start with your router – the core...
In May, while monitoring Roaming Mantis, aka MoqHao and XLoader, we observed significant changes in their M.O. The group’s activity expan...
Mon, May 14, 2018
IT threat evolution Q1 2018
In January, we uncovered a sophisticated mobile implant Skygofree that provides attackers with remote control of infected Android devices...
According to KSN, Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the ...
Thu, May 10, 2018
OPC UA security analysis
This article discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. We hope to draw...
In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the la...
In April 2018, we spotted the first ransomware employing the Process Doppelgänging technique – SynAck ransomware. It should be noted that...
Thu, May 03, 2018
Who's who in the Zoo
ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targets since at least June 2015. The threat actors behind...
Thu, Apr 26, 2018
DDoS attacks in Q1 2018
In Q1 2018, we observed a significant increase in both the total number and duration of DDoS attacks against Q4 2017. The new Linux-based...
This report by Kaspersky Lab ICS CERT presents information on identified servers that have been infected and used by the Energetic Bear/C...
Thu, Apr 19, 2018
Tens of thousands per Gram
In late 2017, information appeared on specialized resources about a Telegram ICO to finance the launch of its own blockchain platform. Th...
Tue, Apr 17, 2018
Leaking ads
We found that because of third-party SDKs many popular apps are exposing user data to the internet, with advertising SDKs usually to blam...
Kaspersky Lab has been tracking a series of attacks utilizing unknown malware since early 2017. The attacks appear to be geopolitically m...
Thu, Apr 12, 2018
APT Trends report Q1 2018
In the Q2 of 2017, Kaspersky’s GReAT began publishing summaries of the quarter’s private threat intelligence reports in an effort to make...
Wed, Apr 04, 2018
Pocket cryptofarms
In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacu...
Wed, Mar 28, 2018
Your new friend, KLara
In R&D we use a lot of open-source projects and we believe giving back to the community is our way of saying ‘Thank you’. More and more s...
Kaspersky Lab ICS CERT publishes the findings of its research on the threat landscape for industrial automation systems conducted during ...
There are three ways of doing things in the malware business: the right way, the wrong way and the way Brazilians do it. From the early b...
At last year’s Security Analyst Summit 2017 we predicted that medical networks would be a titbit for cybercriminals. Unfortunately, we we...
The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses....
Fri, Mar 09, 2018
The Slingshot APT FAQ
While analyzing some memory dumps suspicious of being infected with a keylogger, we identified a library containing strings to interact w...
Fri, Mar 09, 2018
Masha and these Bears
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a prolific, well resourced, and persistent adversary. They are sometimes portr...
In our previous blog , we detailed our findings about the attack against the Pyeongchang 2018 WinterOlympics. For this investigation, our...
Mon, Mar 05, 2018
Mining is the new black
Last year we published a story revealing the rise of miners across the globe. At the time we had discovered botnets earning millions of U...
Wed, Feb 28, 2018
Financial Cyberthreats in 2017
This report summarizes a series of Kaspersky Lab reports that between them provide an overview of how the financial threat landscape has ...
This time, we’ve chosen a smart hub designed to control sensors and devices installed at home. It can be used for different purposes, suc...
Every year, vast numbers of people around the globe relish the delightful prospect of filling out tax returns, applying for tax refunds, ...
In 2017, we encountered lots of samples that were ‘exploiting’ the implementation of Microsoft Word’s RTF parser to confuse all other thi...
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to th...
Thu, Feb 15, 2018
Spam and phishing in 2017
The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. The lowest share (52.67%) was recorded in December 2017. The highest ...
Of all the forms of attack against financial institutions around the world, the one that brings traditional crime and cybercrime together...
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves t...
At first, it looked like we’d found a zero-day local privilege escalation vulnerability for Windows, but the sample that was triggering E...
A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues ...
Tue, Feb 06, 2018
DDoS attacks in Q4 2017
Q4 2017 represented something of a lull: both the number and duration of DDoS attacks were down against the previous quarter. At the same...
Another edition of BSides NYC has passed, and as first time attendee and presenter, I was genuinely impressed with the impeccable organiz...
Thu, Feb 01, 2018
Every little bitcoin helps
It often happens that inventions and technologies that start out good end up turning into dangerous tools in the hands of criminals. Bloc...
On Monday, Jan 29th, IRS officially opened its 2018 season. Right after two days of the opening, we got phishing messages with a fake ref...
Thu, Jan 25, 2018
Denis and Co.
In April 2017, we published a detailed review of a malicious program that used DNS tunneling to communicate to its C&C. That study prompt...

If you are an executive looking for a right IT partnership or you just want to make sure you are taking the correct steps in your decisions feel free to drop us a line. We won’t muddy the waters with tons of biz-speak. But we will bring you a serious return on investment.

Contact QED Systems    or   
Request a Free Quote

QED Systems partners with global leaders in network security and application technologies.