Kate Kochetkova – Kaspersky official blog https://www.kaspersky.com/blog The Official Blog from Kaspersky covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware. Mon, 19 Oct 2020 11:26:03 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://media.kasperskydaily.com/wp-content/uploads/sites/92/2019/06/04074830/cropped-k-favicon-new-150x150.png Kate Kochetkova – Kaspersky official blog https://www.kaspersky.com/blog 32 32 Robots are ready to take human jobs | Kaspersky official blog https://www.kaspersky.com/blog/robots-take-jobs/14732/ Tue, 25 Apr 2017 13:00:05 +0000 https://www.kaspersky.com/blog/?p=14732 Modern robots are very capable: They can carry heavy loads, jump higher than Olympic champions, walk over rough ground, save lives, protect, and destroy. Smart, useful, dangerous — robots are all that and more. In this post we highlight ten amazing robots that either serve humanity right now or are getting ready to.

Top 10 robots ready to take over — or close to it

Robotic surgeon

Since its launch in 2000, the da Vinci robotic surgeon has helped more than 3 million patients worldwide. Developers explain that the surgical device is 100% under the surgeon’s control and gives surgeons a 3D HD view inside of a patient’s body. The robot uses tiny, wristed instruments that bend and rotate, and it provides enhanced vision, precision, and control.

Robotic cook

Not a single robot but a fully equipped kitchen system, the robot kitchen has two impressive robotic hands to mix ingredients and pound chicken. It also uses a food processor instead of knives — not everyone is ready to have a knife-wielding robot in their home.

Ads promise that the robotic kitchen cooks just like a human — “with the same speed, sensitivity, and movement.” To ensure this, developers recorded the movements of Tim Anderson, winner of BBC’s Master Chef title, and taught the kitchen to repeat his “every motion, nuance, and flourish.” The consumer version of the kitchen is set for launch in 2018.

Roboshepherd

This cyber cowboy is still under development, but the latest tests look promising: SwagBot herds animal, carries things, and looks after crops entirely on its own. The robotic shepherd was designed by University of Sydney researchers and the Australian Centre for Field Robotics to help ranchers in some of Australia’s remote areas, where towns and neighbors are hours apart.

During field tests, cows were naturally afraid of their new shepherd, so let’s hope that with time animals will get accustomed to robotic cowboys.

Cyberfarmers

A number of robotic farmers are under development worldwide. For example, the open-source FarmBot is meant to take care of your backyard. The software is free, but you’ll have to pay for the hardware (or find the parts). But isn’t it worth it to be able to say you have a do-it-yourself robo-farmer in your backyard?

Here is a prototype of industrial robotic farming system called AgBot; this solution is designed to fight weeds. It is equipped with cameras and sensors and armed with smart software to work in autonomous groups. The robots work together to inspect, find, and classify weeds. The AgBot can manage detected weeds “either chemically or mechanically, as well as apply fertilizer for site-specific crop management.”

Warehouse worker robot

It’s no surprise that technological giants use robots in their warehouses. For example, in 2015, Chinese company Everwin Precision Technology replaced 90% of its workers with robots. Apple and Samsung supplier Foxconn also replaced 60,000 employees with robots. Amazon already uses more than 30,000 former Kiva robots in their facilities, and it is going to continue adding even more smart machines.

Warehouse work may be the most influenced by the automation process nowadays, but warehouse workers don’t need to panic just yet: Amazon is still hiring.

Drone courier

You can’t argue that Amazon likes robots. That’s why they want drones in their delivery service — and it’s not the worst idea. Just imagine sitting outside in the morning, drinking coffee, greeting the day, and accepting a package from a flying drone. Someday soon!

Amazon is not alone. We’ve already heard about pizza drone delivery. UPS has its own plan for delivery drones: to carry them inside trucks and launch them at various points along their route. However, drone law regulations are quite strict in many countries, so we may not see robo-deliveries for a while.

AI journalist

While hardware robots can’t yet supply us with pizza, their software brothers are getting ready to deliver news to humanity. The natural-language-generation software called Quill developed by Narrative Science is trained to write news stories. And the articles are pretty readable:

“The energy sector was the main contributor to relative performance, led by stock selection in energy equipment and services companies. In terms of individual contributors, a position in energy equipment and services company Oceaneering International was the largest contributor to returns. Stock selection also contributed to relative results in the health care sector. Positioning in health care equipment and supplies industry helped most.”

It might not win a Pulitzer, but it delivers information efficiently, which is the first and main goal of every news story.

Robotic librarian

Sometimes a library needs a robotic librarian — and a huge automation storage and retrieval system — to manage all resources. This is exactly what happened in the University of Missouri Kansas City library. Implementing a robotic librarian saved the university a ton of space. See for yourself!

Security guard robot

Some robots protect our belongings and keep order in shopping centers and on city streets. Standing 1.5 meters (4.9 feet) tall and 0.9 meters (3 feet) wide, the K5 robot is equipped with GPS, lasers, sensors, and cameras, which help the robot to avoid obstacles and monitor surroundings. K5 is already serving society in various places: guarding one of Uber’s car inspection lots in San Francisco and searching for known shoplifters at the Stanford Shopping Center in Palo Alto, California.

Unfortunately, robotic guards are still imperfect.

Robotic soldier

The military has always been at the cutting edge of technology, so naturally, we find the armed forces develping robotic means to patrol, defend, and attack. We’ve already reported on robots that clear mines from the ocean floor or guard sea borders. There are also robots that can detect frightened breathing even though a wall, and robots that can evacuate wounded soldiers.

Here are interesting insectoid robots that look like small bees designed to spy or carry out reconnaissance.

It’s safe to say major developments are being kept top secret, but we did find a cool video of a robotic army dog designed to accompany soldiers and carry supplies on rough country routes. Enjoy!

Taking stock

Some researchers claim that robots are going to take our jobs. Headlines spread the news further, fueling concerns about job security. Other researchers question the inevitability of an “automation bomb,” saying it’s not going to happen in the near future and that when it finally does, robots will create new high-skilled jobs to fill the gap.

Sooner or later, even more machines will come into our lives. We’ll have to wait and see which jobs will become extinct because they will be performed by robots. And who knows, maybe thanks to machines doing hard work, our kids will all be able to pursue whatever they want, and become astronauts, artists, travelers, or some new, not-yet-invented professions. And what will definitely be in demand in the foreseeable future is more security specialists to keep all these robots safe from cybercriminals.

]]>
full large medium thumbnail
How to say “No More” to ransomware | Kaspersky official blog https://www.kaspersky.com/blog/no-more-ransom-update-spring-2017/14503/ Tue, 04 Apr 2017 11:00:04 +0000 https://www.kaspersky.com/blog/?p=14503 One soldier does not make a battle, especially in the world of cybercrime, where hidden dangers lurk in the depths of the darknet and occasionally appear topside. There are a lot of cybercriminals on Earth but they are largely not organized. Cybersecurity experts are no fewer in number — and they can unite around a common purpose to achieve greater results, catch bad guys, and help victims. Basically, that is how the No More Ransom project was born.

The initiative is under nonstop development. As a result we have more good news to share today: Our antiransomware project was joined by new allies. They have contributed support and new decryption tools. The project’s website has also been translated into several new languages.

In July 2016, four cofounders created No More Ransom: Kaspersky Lab, Europol, Intel Security, and the Dutch police. We joined forces to create a platform that could bring real help to ransomware victims — and to all Internet users. We gathered useful tools and manuals, and uploaded them to the website to help either mitigate the results of ransomware attack or to prevent those attacks.

Since the launch, dozens of organizations from all over the world supported the initiative. Even more partners joined today. New from the law enforcement side are Australia, Belgium, Interpol, Israel, South Korea, Russia, and Ukraine. Others are Acronis International GmbH, Crowdstrike, Cyber Security Canada, DataGravity, Deloitte, ENISA, the Global Cyber Alliance (GCA), the Japan Cyber Control Centre (JC3), KUERT Datenrettung Deutschland GmbH, KÜRT Data Recovery and Information Security Co., mnemonic AS, Neutrino srl, Portugal Telecom, Secura Group Limited, SentinelOne, and Verizon Enterprise Solutions. The CERT community — represented by AfricaCERT, BA-CSIRT (CSIRT of Buenos Aires City Government), Centro Nacional de Cibersegurança, Certego Incident Response Team, Cybersecurity Malaysia, and the Japan Computer Emergency Response Team Coordination Center (JPCERTCC) — also contributes strong support.

Some partners brought gifts: Thanks to our new associate partners AVAST, CERT Polska, and Eleven Paths (Telefonica’s Cyber Security Unit), and existing partners Bitdefender, Check Point, and Emsisoft we have 15 more decryption tools on No More Ransom. Good job! It’s also noteworthy that Kaspersky Lab updated Rakhni and Rannoh Decryptors, which were already available on the site to make them even more effective against ransomware. Altogether, the www.nomoreransom.org platform now offers 39 decryption tools, all free.

There’s still more good news. Knowledge is power, but in the digital age it’s a kind of superpower. To make sure that as many users as possible have access to the helpful tools on No More Ransom, we’ve translated the site into eight more languages: German, Spanish, Slovenian, Finnish, Hebrew, Ukrainian, Korean, and Japanese. So now the project’s website is available in 14 languages. More translations are expected to come soon to assist victims across the globe.

Every day we encounter thousands of malicious samples that are related to ransomware. They include but are not limited to malicious executable files, script downloaders, and documents with harmful macros. For common users, malicious files look just like legitimate ones, so it’s no wonder many people become ransomware victims both at work and at home. Since our last report, in December, more than 10,000 victims decrypted their files without spending a penny, using the tools from the No More Ransom platform. Most of the site visitors were from Russia, the Netherlands, the United States, Italy, and Germany.

You don’t have to be a cybersecurity expert to fight ransomware; tell your friends and family about the No More Ransom website. If people in your life neglect basic cybersecurity, you can explain to them how much is at risk: their personal photos, memorable videos, computer game save files, documents from work, and real money.

If you yourself feel that you don’t know enough about ransomware, check out our blog posts, visit nomoreransom.org — and, if you prefer more interactive content, take this quiz. And be safe!

Note: There is a widget embedded within this post, please visit the site to participate in this post's widget. ]]>
full large medium thumbnail
Quiz: Are you ready for a ransomware attack? | Kaspersky official blog https://www.kaspersky.com/blog/ransomware-quiz/14067/ Thu, 16 Feb 2017 16:33:14 +0000 https://www.kaspersky.com/blog/?p=14067 No one expects ransomware — until it happens. If you think it’ll never hit you, consider this: According to Kaspersky Lab data, last year ransomware hit a new victim every 10 seconds. How lucky do you feel?

We created the NoRansom website to help victims. The site hosts all of our free decryption tools and information about ransomware programs. Every Internet user should know how to protect themselves from ransomware, and also what to do in case they’re hit. NoRansom.kaspersky.com serves both purposes, providing both information and utilities. We urge everybody to visit it, although we hope you’ll never need it.

You think you are well protected and don’t need it? Then take our quiz and see for yourself!

Note: There is a widget embedded within this post, please visit the site to participate in this post's widget. ]]>
full large medium thumbnail
Can you get back money stolen by cybercrooks? | Kaspersky official blog https://www.kaspersky.com/blog/no-money-back/13901/ Wed, 25 Jan 2017 09:00:44 +0000 https://www.kaspersky.com/blog/?p=13901 People truly enjoy the perks of the digital era and tend to shop and pay online or via mobile banking. Research commissioned by Kaspersky Lab confirmed that the majority of users (81%) rely on the Internet in their financial routines, and almost half of them (44%) store financial data on their devices.

And yet, only 60% of users install security solutions on all of their devices, and the remaining 40% of respondents are left to the mercy of cybercriminals.

People lose $476 on average per fraudulent transaction. That’s just an average value — one in ten users loses up to $5,000. The compound annual loss sustained as a result of online fraud, identity theft, and malware amounts to billions of dollars worldwide, if we consider only reported cases, which makes the real loss much more substantial.

People lose $476 on average per fraudulent transaction, and one in ten loses up to $5,000

Victims have a fair chance to get back the stolen money if they reach out to the card issuer and perhaps the fraud-handling department of the merchant involved in a rogue transaction. They should do so within 24 hours if possible, giving details of the transaction that was fraudulent. Merchants have no desire to do business with a stolen card, and they will cancel the transaction and revert the amount if you get to them in time. Note that bank services and the laws and practices governing them can vary quite a bit by country, so the advice we give here may apply differently where you live.

Many people think that their bank is the sole bearer of responsibility over the security of their accounts, but bank agreements typically include a passage about the client’s responsibility to keep their financial information secure. The most precious bits of this information are PIN code, CVC code, and one-time passwords sent by SMS. You’re far less likely to get a refund if any of those were used to confirm a fraudulent transaction; banks usually consider compromise of them a user’s fault.

We tried to figure out what it takes to get back money stolen by online scammers, and how many victims were lucky enough to recover their losses.

Is it realistic to expect a return of the stolen money?

The Kaspersky Lab research shows that almost half of respondents feel sure their bank would reimburse money stolen by online scammers. However, here comes the harsh reality: More than 52% of victims did not get back their money at all or recovered only a part of the loss.

More than 52% of victims did not get back their money at all or recovered only a part of the loss.

Unfortunately, the majority of experts in finance agree: Banks are unwilling to return money lost due to fraudulent transactions.

“Don’t assume you can always recover stolen money,” says Vyacheslav Zakorzhevsky, a senior analyst at Kaspersky Lab. “The best way to keep your money safe is to avoid having it stolen in the first place. Use dedicated security products that won’t allow cybercriminals to lay a hand on your personal and financial data.”

What to do if your money is stolen

When you perform a transaction, your bank is just an intermediary between a sender and a recipient. You wouldn’t expect the bank to return money you sent to someone voluntarily (for example, simply by mistake). Would you succeed reverting a fraudulent transaction? It depends on the specifics of the situation.

If your money has been stolen, the first thing you have to do is report the incident to the bank, and if you do that within 24 hours from the time the transaction took place, there is a higher chance to revert the fraudulent transaction.

You need proof you notified the bank in time. Should a bank refuse to give you material proof — a letter acknowledging notification — request a written explanation of why, and when, they declined to issue this document. Then you have to report the incident to authorities. That might be the police, the Federal Trade Commission, or another authority, depending on the jurisdiction. At this point, you have what you need to take the bank to court.

In some cases, the money earmarked for a transaction is put on hold first, and then is transferred. If this is your case, you have a better chance of recovering the money. But, of course, it’s best not to land yourself in such a situation in the first place.

How to protect your credit card

  • Never tell anyone your PIN code, CVC code (the printed code on the reverse side of the card), or a one-time password sent via SMS.
  • Don’t pay with your card at suspicious places; instead use cash.
  • Don’t leave your card unattended when with other people. When handing it to a cashier or a waiter, don’t lose the sight of it at any time.
  • Enable SMS notifications from your bank. Scammers tend to steal money via a series of transactions, so a timely SMS might keep you from bleeding more money.
  • Immediately block or freeze your card if you notice any signs of fraudulent activity.
  • If your bank offers the service, use a virtual card for online shopping. With other cards, ask about enabling zero-dollar limits for online transactions or card-not-present transaction blocking.
  • In addition to implementing safe behavior, it’s critical to install a robust security solution on all devices you use for payments. For example, Kaspersky Internet Security and Kaspersky Total Security have a purpose-built component called Safe Money. This feature ensures all payments are transacted on a legitimate website and over a secure connection, essentially cutting off phishing sites. In testing by independent labs, Safe Money is a top performer.
]]>
full large medium thumbnail
How life on social networks influence our real life | Kaspersky official blog https://www.kaspersky.com/blog/likeaholism/13873/ Thu, 19 Jan 2017 09:00:35 +0000 https://www.kaspersky.com/blog/?p=13873 Have you ever considered how much of our self-confidence depends on likes nowadays? Digital communication is meant to shrink distances and connect people from different cities and countries – to help them keep contact with their friends and family. Unfortunately, it can also work in quite the opposite way. We all agree that Internet cannot replace face-to-face communication but we can’t help but seek attention online. We long for all those precious likes and shares.

Is this problem really that BIG?

The question can bring up many hypothetical and theoretical speculations, so we decided to conduct some research and rely on the data. Our study confirmed that: social networks really do solve a lot of problems, but simultaneously create new ones.

Here are the findings of that study:

Are likes the new standard of self-esteem?

It turns out that one-in-ten social media users lies online to impress friends, acquaintances and even strangers. Sometimes they pretend to be somewhere or doing something that might not be strictly true. Moreover, for popularity many social media users can disregard ethical standards. For example, they are ready to post a photo of their friend in an embarrassing situation. Just for likes.

For popularity many social media users can disregard ethical standards

Revealing something confidential about their friends, employers or co-workers is — as we were surprised to find — not taboo.

Revealing something confidential about their friends, employers or co-workers is — as we were surprised to find — not taboo.

What’s interesting is that, in the hunt for likes, men are ready to go even further than women. Aside from posting embarrassing photos of friends, men are also OK with taking the risk of posting their own embarrassing photos. Men also get more upset more often should their posts get less likes than they had hoped for, or if their significant others forget to like their posts (24% men vs. 17% women).

How does the hunt for likes influence our daily life?

How does the hunt for likes influence our daily life?

We live in the rapidly changing, highly technological world. Having the ability to get in contact with family, friends and colleagues online anytime, we miss the opportunity to see them in person. People admitted that they now communicate less with their parents (31% of respondents said so), children (33%), partners (23%), and friends (35%), because they can see and communicate with them via social media.

When was the last time you visited your friends or family? If you can’t remember, it may be time to go see them.

In addition, the hunt for likes influences our family life. For example 21% of people admit that relationships with their children were damaged when the latter saw their parents in a compromising situation on social media. As we mentioned earlier, people eagerly post something compromising them to get more likes – so it’s a never-ending circle!

Parents seem to be less quick to judge: only 14% of them admitted that they were annoyed by their children’s online behavior. In addition, around 16% of people said that relationship with their spouse or partner was damaged by a compromising post.

What should you do?

Half of our respondents are sure that social networks do not damage the quality of their relationships, on the contrary, Internet makes them feel even closer to their family. It can be true. At the same time Media Psychologist at the University of Würzburg Dr. Astrid Carolus warns that people cannot always evaluate their online communications objectively. That’s why we recommend one simple thing: Remember when you last visited your friends or parents. If it was several weeks ago, maybe it’s high time to pay them a visit. Go to them, bring some pies and say that you missed them. That’s all.

Another thing to consider is how important social media are for you. Do you hunger for more likes? Do you check Facebook several times a day to see if there are new reactions? If you have doubts, take our quiz and find out if you are a likeaholic — or not.

Note: There is a widget embedded within this post, please visit the site to participate in this post's widget.

Our research shows that 58% of people feel uncomfortable and upset when their friends post photos of them that they never wanted to be made public. So here is our third tip: always think twice before posting anything online. You don’t know if this post brings robbers to your home, or if another post hurts your friends’ feelings.

]]>
full large medium thumbnail
Posting airplane tickets online puts your trip at risk | Kaspersky official blog https://www.kaspersky.com/blog/33c3-insecure-flight-booking-systems/13802/ Tue, 10 Jan 2017 14:00:09 +0000 https://www.kaspersky.com/blog/?p=13802 People post photos of their tickets online. Why shouldn’t they? Instagram alone contains thousands of images showing concert, airplane, and even lottery tickets.

If everyone does it, why shouldn’t you?

In fact, the last thing you should ever do with a ticket or boarding pass is post it online. This piece of paper contains data that allows anybody to steal your ticket (we’re not exaggerating!), rack up air miles, or even play a low-down trick on you. More than a year ago we discussed just what kind of bad jokes people can make with ticket information. Recently, security researchers Karsten Nohl and Nemanja Nikodijevic raised the topic again, at the Chaos Communication Congress (33С3).

Airlines, travel agents, price comparison websites, and many other services work together to provide easy booking opportunities to passengers. The industry uses Global Distribution Systems (GDS) to check flight availability, ensure that seats are not double-booked, and so forth. GDSs are tightly interwoven with Web services — but not with best Web protection practices. As the result, today’s GDS technology remains outdated in terms of protection and provides criminals with a huge attack surface.

Although about 20 GDS vendors exist at the moment, the security duo Nohl and Nikodijevic focused on the three main systems: Sabre (founded in 1960), Amadeus (founded in 1987), and Galileo (now a unit of Travelport). These systems administer more than 90% of flight reservations, as well as hotel, car, and other travel bookings.

For example, Lufthansa and AirBerlin work with Amadeus, and with the tour operator Expedia. American Airlines and Russian airline Аeroflot stick to Sabre. Anyway, it’s hard to say for sure which GDS stores the private data of a particular passenger: For instance, if you book a ticket for American Airlines flight on Expedia, both Amadeus and Sabre record the transaction.

Depends on the booking system’s rules, GDS records usually contain a passenger’s name, phone number, date of birth, and passport data, as well as their ticket number, departure and destination ports, and flight date and time. It also includes payment information (such as a credit card number). Quite sensitive information, in other words.

Nohl and Nikodijevic pointed out that a lot of people have access to this data, including airlines workers, tour operators, hotels representatives, and other agents. Researchers suppose that governmental agencies can read this data as well. But it’s only the tip of the iceberg.

To access and change this information, GDSs use a traveler’s name as login and a 6-digit booking code (most travelers know it as a PNR) as password. Yes, that’s the PNR that is openly printed on boarding passes and luggage tags. As a password.

People post photos of their tickets online. Why shouldn't they? Instagram alone contains thousands of images showing concert, airplane, and even lottery tickets.

“If the PNR is supposed to be a secure password, then it should be treated like one,” Nohl said at the conference. “But they don’t keep it a secret: It is printed on every piece of luggage. It used to be printed on boarding passes, until it disappeared and they replaced it with a bar code.” That bar code, by the way, still contains the PNR.

The majority of travelers don’t understand the inner workings of the flight industry, so they eagerly publish their tickets online together with PNR, encrypted into a bar code. However, a bar code is not a mystery; special software can read it. So anybody who takes a photo of your luggage tag at an airport or found your ticket online can access your private data. You don’t need to be a hacker to exploit PNR vulnerabilities — you just have to know where to look. In the video below you can see how Nohl and Nikodijevic decoded the bar code from an Instagram photo of an airline ticket.

In addition, many airlines and trip-checking websites don’t block users who enter wrong codes numerous times. As the result, malefactors can choose popular last names like Smith and simply brute-force PNRs of these passengers. It’s not hard: The code consists of six digits, and code generation algorithms often suffer from certain weaknesses. For example, some of them iterate the first two characters sequentially, and all PNRs generated on a particular date begin with the same characters. Other providers use specific codes for certain airlines. These practices narrow the range of digits an attacker has to guess.

At the Chaos Communication Congress, Nohl and Nikodijevic demonstrated that hacking a PNR takes just minutes. About 30 to 45 minutes into the same video, you’ll find a detailed explanation of how this works as well as real-time demonstration of the whole process.

The upshot is, criminals can farm GDSs for sensitive passenger data and use it for advanced phishing. Consider this scenario: Mr. Smith books a flight to Berlin and 10 minutes later receives an e-mail from his airline asking him to confirm his credit card information. The letter includes his first and last name, port of destination and other precise booking details. Does it seem believable? For sure! Mr. Smith is very likely to click the link in the e-mail and provide his credit card information — but to a fake website.

Also, using a PNR and having searched for some other personal data, hackers might be able to change the ticket data. They might cancel the ticket and have the money refunded to their own account. Or they could change the ticket holder’s name, surname, and passport number so that another person could take the trip (surprisingly, but certain services allow this). A more cautious or generous criminal might simply change the frequent flyer data and get the miles that the original ticket owner would’ve earned. Ultimately, by using PNRs as passwords, GDSs basically offer hackers free flights, unlimited miles, and even money.

One more extremely disappointing fact: Despite experts and media raising this question numerous times in recent years, GDS companies still refuse to log PNR accesses. That’s why nobody can trace the vast majority of abuse cases. Few incidents even become known — for example, when criminals outright stole tickets from travelers and victims complained. As for the more intelligent fraud and data theft, specialists are unable to evaluate the scope of the problem.

Nohl and Nikodijevic feel certain that customers cannot expect substantial changes anytime soon. The entire booking system needs to be rewritten, and unfortunately, the only thing that can make airlines do this is the rise of PNR fraud.

For now, we recommend two simple courses of action: stay vigilant and never, ever post your boarding passes online. Even an old ticket gives away a lot of your personal information.

]]>
full large medium thumbnail
Quiz: Can you tell a cyberthreat from biological one? | Kaspersky official blog https://www.kaspersky.com/blog/virus-or-virus-quiz/13724/ Wed, 21 Dec 2016 14:02:47 +0000 https://www.kaspersky.com/blog/?p=13724 Some physical viruses and parasites behave a lot like electronic viruses — or is it the other way around? Viruses take control of their hosts and use them to reproduce and to infect other victims. Physicians and cybersecurity experts can differentiate their behavior patterns. Can you?

Note: There is a widget embedded within this post, please visit the site to participate in this post's widget. ]]>
full large medium thumbnail
Facebook privacy settings: from A to Z | Kaspersky official blog https://www.kaspersky.com/blog/facebook-privacy-settings/13578/ Fri, 09 Dec 2016 14:00:10 +0000 https://www.kaspersky.com/blog/?p=13578 Facebook’s settings are a moving target. Over the past few years, the company has changed various settings several times, adding, moving, even removing options. Now it’s really easy to get lost among all these functions. So, once again, we’re here to explain how to fortify your Facebook privacy. For more on Facebook security, check out our post, Everything you need to know about Facebook security settings.

Facebook’s settings tabs contain quite a range of options. We’ll structure our tutorial the way Facebook organizes its settings — at least, for now.

The Privacy tab

Facebook privacy settings: What you need to know

Who can see my stuff? This tab has three interesting settings.

1. Who can see your future posts? No mystery here: Use this setting to specify who will see your new posts: your Facebook friends, friends of your friends, all Internet users or a certain set of people. Note that this option does not change access settings for your old posts, only for new ones. If you want to hide old posts, see point three.

It’s also noteworthy that you don’t need to delve into the settings to find this option — if all you want to do is set up who can see a new post, use the button below the new post field, to the left of the Post button.

Facebook privacy settings: What you need to know

2. Review all your posts and things you are tagged in. Clicking this link brings you to your Activity Log. When you like a post, leave a comment under a friend’s post, or tag somebody in a picture, that action appears on this page. Check the Comments tab if you want to find all your comments; the Likes tab contains everything you ever “liked”; and wouldn’t you know it, Posts You’re Tagged In shows the posts in which you were tagged.

Facebook privacy settings: What you need to know

3. Limit the audience for posts you’ve shared with friends of friends or Public?. This setting lets you hide old posts from friends of your friends or Internet users in general. Even if you activate it, your friends will still have access. Be careful: If you want to undo this action in the future, you’ll need to adjust the audience of each individual post. You can learn more about it here.

Remember, you can change access rights for a particular post anytime. Just choose Edit Post, then click the button with access rights (to the left of the Save button) and choose its audience from the drop-down list.

Who can contact me? — here you can choose who can send you friend requests: everybody or only friends of your friends.

Who can look me up? — People can use Facebook to search for other people by phone numbers and e-mail. Use this setting to allow or forbid the social network to show your account to people who try to find you using this data.

Here you can also hide your Facebook account from Google, Yahoo, and other search engines.


Timeline and Tagging

Facebook privacy settings: What you need to know

Who can add things to my Timeline?
Who can post on your Timeline? Choose who can post on your page — you alone or your friends as well. The primary (and usually the only) reason for people to use this option is to wish friends a happy birthday. However, if some of your Facebook friends are in fact strangers you should probably limit access to your Timeline.

Review posts friends tag you in before they appear on your Timeline? Here you can take control over posts with tags. Turn the feature on and these posts will be automatically added to the Timeline Review page and you’ll get a notification so you can check them.

Facebook privacy settings: What you need to know

Keep in mind that this option lets you approve or hide tagged posts from your Timeline only. Tagged content will be available regardless in Facebook search results, newsfeeds, and other places on the social network.

Who can see things on my Timeline?
Review what other people see on your Timeline — click this link to see what your Timeline looks like to other people — or to a specific friend.

Who can see posts you’ve been tagged in on your Timeline? We have control over the content we publish. Sometimes friends tag us in photos and posts that should not be public. If you don’t want to review each tagged post published by your friends before they get to your Timeline you can set privacy settings for all such posts at once.

Choose “Only me” or make a “Custom” list to hide those tagged posts from public. You can also manually untag any post or photo you dislike. You can read more about that here.

Who can see what others post on your Timeline? Here you can hide from your friends what your other friends post on your Timeline.

How can I manage tags people add and tagging suggestions?
Review tags people add to your own posts before the tags appear on Facebook? Sometimes friends tag in people in your photos who are not really depicted there. In addition, tagging can attract the attention of people outside your friend circle whom you would prefer not to see the post. This option lets you take control over this situation.

When you’re tagged in a post, who do you want to add to the audience if they aren’t already in it? You can add a post you’ve been tagged in to your Timeline or hide it. But even if you hide it, the post will still be visible on the page of its creator, in the newsfeed, in the search results of your mutual friends, and other places. If you want to hide these posts from other people, choose “Only Me.”

Who sees tag suggestions when photos that look like you are uploaded? Facebook uses a proprietary facial recognition system to match pictures with users. When people upload portrait photos, the social network makes suggestions — for easier tagging. If you want stop Facebook from doing that to you, use this setting.

Blocking

Facebook privacy settings: What you need to know

Here we have three useful settings.

Restricted List — this list is one more way to divide posts into personal and public. Friends you add to this list will not be able to see posts visible to your general friends audience. Restricted friends will still have access to things you share publicly or on a mutual friend’s Timeline, and to posts they’re tagged in. Facebook doesn’t notify users when they are added to the restricted list. You can read more about this option here.

Block Users — if you want to break entirely with a certain Facebook user, just block him or her. The blocked person won’t see things you post on your Timeline or be able to tag you, invite you to events or groups, start a conversation with you, or add you as a friend.

Block Pages — you can also block pages that belong to an online shop, newspaper, or other organization. Note that this breakup is mutual: The blocked Page will no longer be able to interact with your posts, or like or reply to your comments, and you will similarly be unable to post to the Page’s Timeline or message it. If you liked the Page before, blocking it will also unlike and unfollow it.

Public Posts

This page has several interesting settings as well.

Facebook privacy settings: What you need to know

Who can follow me Here you can allow people who are not your friends to follow you. If they do, your public posts will be added to their newsfeeds.

Public post comments, Public post notifications, and Public profile info
Here you can choose who is allowed to comment on your public posts, and decide if you want to receive a notification when users who are not on your friend list follow you, like, comment on, or repost your public posts.

Ads

Facebook gathers data about you: what you like and post, which websites you connect to your social media account, and more. The social network uses this info to show ads to you and your friends. If you don’t approve, prohibit Facebook from using your data for advertising.

Facebook privacy settings: What you need to know

]]>
full large medium thumbnail
Real deal or phishing? | Kaspersky official blog https://www.kaspersky.com/blog/black-friday-scam-quiz/13485/ Mon, 21 Nov 2016 14:06:32 +0000 https://www.kaspersky.com/blog/?p=13485 Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the price of a pair of socks, bad guys are trying just as zealously to steal your money. Take our quiz to check if you can avoid the traps set by cybercriminals.

Note: There is a widget embedded within this post, please visit the site to participate in this post's widget.

It was simple, wasn’t it? If you want to know more about phishing and other types of holiday fraud, you can also read our post. Here’s another interesting post, this time we look at how criminals used technology and phishing to trick thousands of people during the Olympic games.

Be safe and happy shopping this Black Friday!

]]>
full large medium thumbnail
Test: Are you a cybersecurity know-it-all? | Kaspersky official blog https://www.kaspersky.com/blog/cybersecurity-know-it-all/13468/ Wed, 16 Nov 2016 15:18:46 +0000 https://www.kaspersky.com/blog/?p=13468 full large medium thumbnail