Cybersecurity

New Spectre-v2 vulnerability

Meltdown and Spectre are vulnerabilities in modern computers that can be used to leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. The vulnerabilities were found in 2017 by several researches, but were kept secret

Unusual aircraft GPS interference

Finland’s Transport and Communications Agency, Traficom, has issued a public announcement informing of an unusual spike in GPS interference near the country’s eastern border. According to reports, the interference isn’t limited to Finland but also affects Poland, Lithuania, Latvia, and the broader Baltic region. This spoofing is relatively easy because the actual GPS signal is

Cyber attack maps

Cyber attacks happen all the time. There are many real-time cyber attack maps on-line. Articles Top 15 Live Cyber Attack Maps for Visualizing Digital Threat Incidents and 7 Live Cyber Attack Maps list many maps. Some are funny, some seem ominous, and all of them tell a story that words alone cannot: cyber attacks never

Ukraine-Russia cyber war

Ukraine and Russia seems to be at the moments on both traditional and cyber war. We could call that hybrid warfare. We are at a cyber war. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of

Friday Fun: 2021 Information security in memes

Remember the most interesting events of the information security industry in 2021 in memes and tweets and fairy tales. 2021 Information security in memes and tweets https://www.kaspersky.com/blog/security-2021-year-in-memes/43237/ Hans Christian Andersen on security technologies https://www.kaspersky.com/blog/andersen-cybersecurity-technologies/43232/