Exploit This

Security News, Exploits, and Vulnerabilities.

Satoshi Bomb

Let us discuss what defines the profitability of bitcoin mining, what principles for mining speed adaptation were initially embedded into it, and why these principles can lead to the failure of the cryptocurrency in the long run.

False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Regretfully, only then does the idea dawn on these developers that high-quality protection from cyberthreats involves not only prevention but also a low false-positive rate.

The security is still secure

Recently WikiLeaks published a report that, among other things, claims to disclose tools and tactics employed by a state-sponsored organization to break into users’ computers and circumvent installed security solutions. The list of compromised security products includes dozens of vendors and relates to the whole cybersecurity industry.

Rocket AI and the next generation of AV software

What would happen if we did the same thing that the respected AI experts did? We could come to agreements with other representatives in the cybersecurity area and create a joint project. Meet Rocket AV.

Machine learning versus spam

At Kaspersky Lab, machine learning can be found in a number of different areas, especially when dealing with the interesting task of spam detection. This particular task is in fact much more challenging than it appears to be at first glance.

Lost in Translation, or the Peculiarities of Cybersecurity Tests

AV-Comparatives simultaneously conducted two tests of cybersecurity products using one and the same methodology. What’s the difference between them and how to read the reports to see manipulation of figures and recognize biased marketing ‘next-gen’ rhetoric.

Five myths about machine learning in cybersecurity

Machine learning has long permeated all areas of human activity. I would like to warn about, or dispel, some of the misconceptions associated with the use of ML in the field of cybersecurity.

Surges in mobile energy consumption during USB charging and data exchange

Is it possible to measure the energy consumed by a host and mobile when they exchange data over the USB connection? We could find in-depth research on energy consumption for USB data transfer, so we decided to carry out our own experiment.

Wired Mobile Charging – Is it Safe?

How safe is it to charge your phone using USB ports? Our experiment shows that it is far from being safe – it comes with risks of losing data or even gaining access to the device by cybercriminal.

Experts: what ATM jackpotting malware is

Kaspersky Lab security researchers Santiago Pontirol and Roberto Martinez explain how ATM malware works in Latin America and why it’s difficult to discover ‘jackpotting’ malware.

%d bloggers like this: