
Internal threats: “accidental sharing” leads to loss of more data than software flaws
Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.
866 articles
Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Linux bugs may affect or directly threaten entire virtualization infrastructures: Whatever OS is used on VMs, an attack on a hypervisor is possible from both the outside and inside, and exploitation of the dreaded Shellshock vulnerability on Linux-based hypervisors is a possibility, too.
Can a business be “partially” prepared to ward off cyberthreats? That’s up for debate, but it seems there is little difference between “partial protection” and no protection at all.
Vulnerabilities vary. Some are considered critical, some – less problematic; their severity is determined by a few well-known factors such as ease of exploitability and popularity of software. But, no matter their differences they all require serious attention at a constant level, so that when the next Shellshock-like incident occurs, it won’t take cybersecurity world by surprise.
APT is a term often mentioned in cybersecurity bulletins. Here’s what you need to know to understand it.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
The biggest concern about Apple Pay is that one’s iCloud account now controls not only private photos, app data, and messages, but also money. You lose your password – you lose everything and as the celebrity hack showed us, there is no need to hack Apple’s servers. Social engineering, phishing, trojans – all cybercriminal tools will now be targeted at people’s electronic wallets.
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
We have bought our very own Blackphone to check its security firsthand.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.