Exploit This

Security News, Exploits, and Vulnerabilities.

Features of secure OS realization

There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to implementing these principles.

Machine learning versus spam

At Kaspersky Lab, machine learning can be found in a number of different areas, especially when dealing with the interesting task of spam detection. This particular task is in fact much more challenging than it appears to be at first glance.

Loop of Confidence

With the arrival of Apple Pay and Samsung Pay in Russia, many are wondering just how secure these payment systems are, and how popular they are likely to become. In our opinion, these technologies require a more detailed examination and a separate evaluation of the threats they face.

Five myths about machine learning in cybersecurity

Machine learning has long permeated all areas of human activity. I would like to warn about, or dispel, some of the misconceptions associated with the use of ML in the field of cybersecurity.

Future attack scenarios against ATM authentication systems

The report comprises two papers in which we analyze all existing methods of authentication used in ATMs and those expected to be used in the near future, including: contactless authentication through NFC, one-time password authentication and biometric authentication systems, as well as potential vectors of attacks using malware, through to network attacks and attacks on hardware components.

Small users in a big network

In this article, we analyze statistics for visits by children to websites belonging to categories of undesirable content, as defined in the Parental Control module. These statistics allow us to estimate which categories of undesirable websites children visit most often.

The second round of CODE BLUE in Japan

A cutting-edge IT security conference, was held from 18th -19th December. It was the second round, following its first occurrence in February 2014.

%d bloggers like this: