
Antispam technologies: secure mail for people and business
Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.
3956 articles
Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.
SC Magazine’s annual Award results are in, and Kaspersky Lab is among the winners.
Facebook attracts a lot of cyber-criminals. Kaspersky Lab partnered with Facebook to protect you from these cyber-criminals.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let’s see what these curious techs are about.
Most of the security announcements surrounding Windows 10 business-oriented, as they address the primary IT security problems businesses have to face. Judging by those announcements, Microsofts seems to address the issues properly.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
Kaspersky Lab has just released its quarterly report on IT threats evolution. It’s full of woeful figures, showing that threats keep climbing. Judging by dynamics, this trend is here to stay for a time.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
A serious zero-day has been disclosed in Unity Web Player. We provide a full breakdown of what it means and how you can protect yourself.
Cybercriminals frequently use spam as the primary channel to spread malware. Of course, this is something we should take care of.
“Retrofitted and added cybersecurity” is not an option for the Smart Cities concept: risks are too dire to build “seven cities of cyber-Troy” upon each other. Our position here is that cybersecurity should be considered early on, at every possible level.
The first technology to enable instant long-distance communication was the telegraph. Back in its time, the telegraph helped to shape many of the current IT infrastructures.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
The primary issue here is the real cost of free offers. Hola’s stance is almost honest: You want free services? You have something that is of use to us – your idle or not-so-idle resources. If you don’t want them to be used by us, there is a paid tier for you.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals to post them on Instagram and talking to each other on Facebook?
It looks like the development of BYOD in the commercial sector has outrun the recognition of the risks it poses. It’s worth mentioning, however, that similar risks are posed by any new “invasive species” of tech, and there is nothing unseen with BYOD.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.
According to a study by Kaspersky Lab and B2B International, only 37% of the organizations surveyed said they currently have measures in place to protect against DDoS-attacks.