0day #vulnerability in Tor Browser, that allows to deanonymize #Tor users https://t.co/V4kw60XhBO
— Denis Makrushin (@difezza) 30 ноября 2016 г.
Blog
In Q3 2016, attempted infections by financial #malware were registered at 1.2m users’ computers #banking https://t.co/dTD5LqOeM7
— Denis Makrushin (@difezza) November 8, 2016
Fooling the #SmartCity: security analysis of public terminals, road sensors and road infrastructure devices https://t.co/Nh9tlVizeM
— Denis Makrushin (@difezza) 15 сентября 2016 г.
The concept of a smart city involves bringing together various modern technologies and solutions that can ensure comfortable and convenient provision of services to people, public safety, efficient consumption of resources, etc. However, something that often goes under the radar of enthusiasts championing the smart city concept is the security of smart city components themselves. The truth is that a smart city’s infrastructure develops faster than security tools do, leaving ample room for the activities of both curious researchers and cybercriminals.
Hey, young researcher, @kaspersky launched #TalentLab for you! And especially we’re looking for talents in the topic https://t.co/kGtQ3fkc71
— Denis Makrushin (@difezza) 5 сентября 2016 г.
The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
In Q2 2016, Attempted infections by financial #malware were registered on 1.1M user computers #KLreport #banking https://t.co/CrghHfIgCC
— Denis Makrushin (@difezza) 11 августа 2016 г.