How a single cybersecurity incident can kill your business
“A single cyberincident can kill a business” may sound like an exaggeration, but it is not. In this blog post we prove it with two different stories.
3886 articles
“A single cyberincident can kill a business” may sound like an exaggeration, but it is not. In this blog post we prove it with two different stories.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What is the best way to start assessing your company’s cybersecurity issues? First, look around at what you have.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
As part of its Project Zero security initiative, Google disclosed a few vulnerabilities in Windows, some ahead of a planned patch. Google simply adhered to its “publicize in 90 days after private vendor disclosure” policy, but where are end users’ interest in this “game of flaws”?
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren’t good at servicing their computers, I often have to apply my expertise once again.
Kaspersky Lab has just released its forecast of digital realities for 2045. Big changes are anticipated for the entire IT world and businesses. Security challenges will change as well.
Gartner named Kaspersky Lab a “leader” in the Magic Quadrant for Endpoint Protection Platforms rating for the fourth consecutive year. In this new podcast, Brian Burke, Kaspersky Lab’s global director of market intelligence and analyst relations, explains why Gartner’s Magic Quadrant matters.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
There are various ways to assess the threat landscape, but it’s what companies think of it that is most important. We decided to pick the top 10 events of 2014 by a single criterion: the popularity of the corresponding stories. And here is what we came up with.
If you use an ATM card, you are of interest to carders. How do these criminals act and how can you keep your bank account safe?
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
A researcher has developed a nasty bootkit capable of taking complete control of OS X devices. Here is what you need to know.
Cryptolocker is still making the rounds, even though its peak seems to have passed. Or is it just an illusion? How does it affect businesses? Read some real stories and explanations in the new blogpost at Kaspersky Business.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We have a special solution for multi-device users. If you are using our products on many devices, we recommend you register on the My Kaspersky web portal.