Four eyes won’t always see in one direction, or why installing five antiviruses is a bad idea
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
3886 articles
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
A serious elevation-of-privileges vulnerability had been discovered in Linux in late April. Bugs like this are especially problematic for businesses, and require a prompt reaction.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
Yesterday marked the 10 year anniversary of the first smartphone malware being discovered. Today, Cabir worm looks harmless: it doesn’t steal money or passwords, nor does it delete users’ data. But it drains the battery within
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
Cabir, the first smartphone virus ever, turns 10. Here are some amusing facts about it.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
It’s time to reconsider our stance on data storage, and in the process, perhaps we can force a little cybersecurity education. One solution is to apply “The Three Ps” to every data storage decision a company makes (at least about PII or valuable secrets).
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.
How iOS 8 and Tizen releases affect smartphone market and security landscape.
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
This is a short excerpt from what is said to be unearthed medieval manuscript, describing a way of keeping secrets. While we are not sure it’s authentic, the method described seems quite useful today.
A serious cross site scripting vulnerability was discovered in the popular Twitter application TweetDeck today. Users should revoke access to that app on Twitter as soon as possible.
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.co.za/blog/tag/securityIS
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?