Drastic mindshift needed to combat cybercrime

Cyberattacks: Writing your own ransom note?

According to International Data Corporation (IDC), 66% of CEOs will have digital transformation at the heart of their corporate strategy. That said, 70% of siloed digital transformation initiatives will fail by 2018 due to insufficient collaboration, integration,...
Writing the history of cyber threats

Writing the history of cyber threats

By Ovanes Mikhaylov, MD: emerging markets at Kaspersky Lab A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats. This person will obviously start with Stuxnet, and go through the findings of campaigns like The...
How to find a ‘super hacker’

How to find a ‘super hacker’

It doesn’t matter how careful they are, ‘super hackers’ will leave a trace of their activities. Windows event logs, DNS logs and DHCP logs – sources not normally analysed from an attack detection perspective – all hold clues to the clandestine...