
Spam the scam: unimaginative in large numbers
It’s like spammers aren’t even trying anymore. Still, be on the lookout for some of these typical tricks.
3956 articles
It’s like spammers aren’t even trying anymore. Still, be on the lookout for some of these typical tricks.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
Backdoor is a very graphic term, but does it explain the tech behind it? We try to shed some light.
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.
DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
These young researchers will shape cyberworld in the next decade.
Avoid becoming a victim as some of our friends did, watch your card closely.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
451 Research has released a very complimentary overview of Kaspersky Lab’s current position and strengths. Here’s some commentary from their report.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS
Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.
IT departments take most of the responsibility for the company cybersecurity. However, how fair is it to charge them with 100% of responsibility for everything that happens there? Cynthia James shares her thoughts on this matter.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com.au/blog/tag/securityIS