
What to do, if someone really stole 1.2 BILLION passwords?
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
3956 articles
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Kaspersky Lab has just released a new report on the evolution of threats in Q2. Banking Trojans grow in numbers (and the level of danger they pose), while Russia remains the most malware-attacked country.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
A visual representation of a problem appears just a bit more meaningful, and at the same time more comprehensible, than large sheets of texts. Here is a big (or not so big) picture of threats to medium-sized businesses.
Participate in Kaspersky Lab’s Global Think Test to test your brain power.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
As a security vendor, we at Kaspersky Lab have to foresee possible problems stemming from essentially good things. Serious transformations in the software market bring both new advantages, but also new problems and challenges, to which we need to pay attention.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
The same code base of Windows for various devices means also that the same malware can hypothetically attack all of them.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?