
Why it is better to purchase an antivirus directly from the developer
When you want to save money by buying an antivirus from untrusted online sellers, you ultimately risk your money and might land in trouble afterwards.
3956 articles
When you want to save money by buying an antivirus from untrusted online sellers, you ultimately risk your money and might land in trouble afterwards.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Kaspersky Lab has launched public beta-testing of its enterprise security solution, Kaspersky Endpoint Security 10 Service Pack 1. Take a look at the screenshots showcasing the new features.
Many organizations—especially government agencies or heavily regulated businesses—are nervous about sharing this data, for fear of reprisals if information about successful attacks becomes public. And politicians and security experts say this is an issue that needs to be solved if businesses are going to have the chance to succeed.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Cybercriminals actively use online payments to their own advantage, but Kaspersky Lab knows how to outwit them!
Every fifth Android-based device protected by Kaspersky Lab security solutions was attacked by malware at least once in 2013-2014. In 60% of the registered attacks the malware used had a “financial” nature. While there’s seemingly nothing unexpected a certain twist is present…
Brian Donohue and Dennis Fisher talk about a new attack on the SSL protocol, which is now known as POODLE.
From time to time, PC users face situations where a system is totally damaged and almost nothing can fix it. The Kaspersky Rescue Disk is our solution for such a situation.
A critical civilian system goes down – it’s a scenario that evokes some apocalyptic pictures of destruction and mayhem; remember, for instance, “Die Hard 4.0”? Actually this could happen with any corporate infrastructure, since all of them have certain critical systems of their own.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Linux bugs may affect or directly threaten entire virtualization infrastructures: Whatever OS is used on VMs, an attack on a hypervisor is possible from both the outside and inside, and exploitation of the dreaded Shellshock vulnerability on Linux-based hypervisors is a possibility, too.
You will no longer need to download the installer and manually upgrade to the newest version of Kaspersky Internet Security; your antivirus will do it automatically for you!
A data access policy becomes an issue for any company as soon as it accumulates a considerable amount of valuable and sensitive data. That doesn’t mean the policy is always in place when it should be, or that it’s implemented properly.
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
Can a business be “partially” prepared to ward off cyberthreats? That’s up for debate, but it seems there is little difference between “partial protection” and no protection at all.
Vulnerabilities vary. Some are considered critical, some – less problematic; their severity is determined by a few well-known factors such as ease of exploitability and popularity of software. But, no matter their differences they all require serious attention at a constant level, so that when the next Shellshock-like incident occurs, it won’t take cybersecurity world by surprise.
Antivirus protection is often perceived as a process of simply blocking what is bad. However, it’s as much a process of approving what is good.