Смотрите также связанные темы 28.09.2018 Kaspersky Lab Warning: Government IT and Incident Response Staff Targeted by Cyberattacks in Middle East & North Africa Kaspersky Lab warns about the activity of an Arabic-speaking cybercriminal group called by the experts ‘The Gaza cybergang’
14.01.2018 Kaspersky Lab Identifies Operation “Red October,” an Advanced Cyber-Espionage Campaign Targeting Diplomatic and Government Institutions Worldwide Attackers Created Unique, Highly-Flexible Malware to Steal Data and Geopolitical Intelligence from Target Victims’ Computer Systems, Mobile Phones and Enterprise Network Equipment
26.04.2018 Eugene Kaspersky calls for closer collaboration between government and business to combat cyberthreats Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, is urging greater collaboration between the UK government and the private sector to address the very real and potentially devastating threat of cyberwarfare and the consequent risks posed to critical infrastructure.
09.07.2018 Kaspersky Lab and the Gabonese Government Sign a Memorandum of Understanding Kaspersky Lab has signed a memorandum of understanding (MoU) with the National Agency of Digital Infrastructures and Frequencies (ANINF)
05.11.2018 CVE-2010-3916 Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3915.
13.01.2018 Quote of the Week: Malware Targeting Smart Cards Used by Government Employees - Such a Surprise? "There are several reasons why the discovery of a new variant of Sykipot targeting smart cards didn’t shock me."
27.04.2018 CVE-2012-0269 Buffer overflow in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, oreplug, Shuriken Pro4, Shuriken 2007 through 2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 through CE/2009 Corporate Edition, Shuriken 2010 Corporate Edition, Rekishimail Sengokubusho no missho, and Bakumatsushishi no missho allows remote attackers to execute arbitrary code via a crafted image file.
|