Opens profile photo
Follow
Eugene Kaspersky
@e_kaspersky
CEO of . 30+ years in #cybersecurity. Views are my own
Mainly on the roadeugene.kaspersky.comJoined May 2011

Eugene Kaspersky’s Tweets

What day today? It's Anti-Ransomware Day! We look back on the events that shaped the ransomware landscape in 2022, review the trends that were predicted last year, discuss emerging trends, and make a forecast for the immediate future 👉 kas.pr/p8v1
Image
20
We are proud to share that the last decade has seen our products stand the test of time and ace over 800 independent reviews. With 587 first places🥇 and 685 top-3 finishes🥉in these tests, our solutions are trusted by millions worldwide🌍 Details 👉 kas.pr/r86q
Image
7
Hi all – from Everest Base Camp! 5364 meters above sea-level! But that’s enough for me – we weren’t planning on going further anyway :)
Image
Image
6
47
The bars serve the drink Nepenthe, which is a lubricant for protection against mechanical wear-and-tear mixed with subparticles delivering programming updates. Truth be told, this doesn’t seem very safe. Still, at least now we know they can get any updates at all!
1
Show this thread
BTW, we now know how droids get their software updates. It turns out, they visit bars to get updated… through booze! (I guess that makes a good excuse when asked “why are you drunk again?”: “Just updating, darling!”)
1
5
Show this thread
Square profile picture
ICYMI - Vulnerabilities have been found in iOS & macOS. The flaws include one which allows attackers to gain access to sensitive user info by intercepting net traffic, as well as a bug that allows malware to bypass Apple's security & gain root access.
8
How AI can leak your private data? Image-generating neural networks like DALL-E, Imagen or Stable Diffusion are already everywhere. Put aside the ethics and legality of generative art let's discuss what privacy risks do they pose? 👉 kas.pr/me77
Image
3
17
Square profile picture
Amazing news! 🏆 AV-TEST has confirmed that Kaspersky's Endpoint Security for Business, Small Office Security, and Internet Security have all proven to be 100% effective against ransomware attacks!!
Image
17
5 types of attacks on hardware crypto wallets Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from 👉 kas.pr/s15x
Image
2
28
We detected a significant increase in attacks with QBot Trojan using e-mail messages based on real business letters. This afforded the attackers the opportunity to join the correspondence thread with messages of their own 👉 kas.pr/dt8h
Image
Image
2
14
What really goes on when your device is in repair? Informally servicemen admit they occasionally held viewings of homemade porn found on the devices they repair. How to protect yourself from nosy maintenance technicians? 👉 kas.pr/z5uj
Image
10