HDRoot: Winnti APT group’s new (or not?) toy
In the fierce storm of active APT campaigns there is always something in motion. Researchers pin down and catalogue new threats all the time, but old names occasionally pop up,
3886 articles
In the fierce storm of active APT campaigns there is always something in motion. Researchers pin down and catalogue new threats all the time, but old names occasionally pop up,
Yesterday The European Court of Justice ruled that the Safe Harbor agreement is invalid: what does this decision mean for your personal data?
Are you committing these six online parenting sins? If so, please stop.
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
What is the difference between real and theoretical threats?
Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life’s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?
Our vocabulary continues to evolve as we see slang enter our lexicon. From Googling to memes once-thought silly words have become accepted. This evolution is also impacting the way we write and punctuate statements online.
Kaspersky Lab recently launched an online quiz “Are you cyber-savvy”, and the first results are in. While oriented towards end-users, this quiz’s results may serve as another alert for businesses, especially those that are online-based.
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
We sit down with one of our interns to discuss what it is like to work within Kaspersky Lab.
While the total amount of companies reporting to experience DDOs attacks is more or less stable over recent years, in 2015 there was a slight increase in the number of businesses considering them the most damaging type of cyberincidents.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Two young individuals were arrested by Dutch police on suspicion of involvement in CoinVault ransomware attacks.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
When you purchase software, you automatically agreed that your device complies with systems requirements defined by the software vendor. That’s why you should always read them carefully before ever buying anything.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
If the idea of “hacking-back” against cybercriminals who have harmed you or your company has seized you, your executive team, or your spouse as a reasonable thing to do, read
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Kaspersky Lab, together with B2B International, has conducted a new survey of IT security risks.