
Cyber-espionage: the ways to keep intruders off
Kaspersky Lab recently published a new survey called “Who’s spying on you” to describe the arising problem of cyber-espionage. In our previous article we pointed out that any company or
1249 articles
Kaspersky Lab recently published a new survey called “Who’s spying on you” to describe the arising problem of cyber-espionage. In our previous article we pointed out that any company or
Whenever one hears the words ‘cyber espionage’, large-scale campaigns affecting entire national states and transnational corporations such as Aurora, Flame or Duqu come to mind. Unfortunately, cyber espionage doesn’t necessarily
The year started with Intel, AMD and their OEM partners announcing that they would soon release PCs that run both Android and Windows 8.1 at the same time. The pilot
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise
Congrats on being named a Channel Chief two years in a row. How has the past year been for the channel program? Last year we were focused on partner enablement
Game of Expectations Kaspersky Lab’s experts detected phishing newsletters that were supposedly advertising the messenger service, WhatsApp, being released for PC. WhatsApp is an extremely popular messenger for mobile platforms,
At the Mobile World Congress held in Barcelona Kaspersky Lab presented a new platform designed to protect financial transactions on the Web – Kaspersky Fraud Prevention. The solution is primarily
There is a lot of talk these days about cybercriminals growing shrewder. They are less interested in getting notoriety for crashing a number of websites or launching large-scale mail worm
With the threat landscape changing, the methods of protecting corporate resource develop, too. However, the key principles stay the same: know your basic vectors of threats, minimize possible human factor
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we
The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet – from refrigerators and washing machines to irons. Just like
Year after year, there is an expectation for the Kaspersky Lab North American Partner Conference to be something spectacular and this year surely did not fail to meet that expectation.
Today is the second day of Kaspersky Security Analyst Summit 2014 – the security conference initiated by Kaspersky Lab, where our experts, security pros from other companies and independent researchers
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“, dedicated to the current cybersecurity situation and main trends in this field. As
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
American information security experts warned about new DDoS attacks that leverage the Network Time Protocol (NTP) to enhance garbage traffic. The United States Computer Emergency Readiness Team (US-CERT) published a
Kaspersky Lab’s third annual Industry Analyst Summit is an exclusive invite only event held on February 5-7, 2014 in the Dominican Republic. The event has grown steadily each year and
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“. The survey focuses on businesses, which are now becoming the main objects of
Readers who follow our information security digests may have already noticed several exotic incidents and malware campaigns, which took place over the past three months. Some of them deserve special
Online payments have remained one of the most vulnerable sections of the IT perimeter. Most banks and payment systems now have two-factor authentication. However, not all of them have instituted