Cryptolocker 2.0: thief and impostor
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
3909 articles
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
You can locate your misplaced phone using any device connected to the Internet such as a tablet. Simple as A-B-C.
A number of widely used iOS banking applications from some of the world’s most prominent banks contain bugs that expose users to data theft and account takeovers. Specifically, a knowledgeable
Kaspersky Lab products have, once again, come out on top in independent testing of the leading security products. In quarterly testing conducted by security analyst Dennis Technology Labs from October
What browser do you use to surf the Internet? If you are a user of Microsoft Internet Explorer, then this tip is for you. The browser has a lot of
The Problem One of the most effective and dangerous ways to run malicious software on a victim’s computer is by exploiting vulnerabilities in popular applications or within the operating system.
Skype commercials make grandparents seem so happy, and why wouldn’t they be? Through the magic of the Internet, they can connect with their grandchildren and other loved ones instantly and
2014 will be an important year in the development of new cybersecurity threats. Threats related to commercial espionage and new forms of end-user targeting by criminals will likely be present.
Hello Kaspersky Lab blog readers! We’re always reminding you how important it is to buy licensed products. However, you should remember that not all software sold in stores or online
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
It may be the New Year, traditionally a time for new resolutions and goals, but we at Kaspersky Lab are continuing our dedication to standing by our promise to bring
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage, with cyber-mercenaries/cyber-detectives playing an active role in such attacks. The full report is
The problem Any company regardless of the level of maturity possesses some valuable information which having got into the hands unscrupulous individuals can put an end not just to the
In December 2013 information security incidents proliferated, unfortunately. Even if the number of incidents remained within the average values, their significance, alas, was not moderate. The interests of millions of
Passwords. They are a curse. However many of them you try remember, they are being forgotten. No matter how many of them you write down on paper they get lost.
The global Kaspersky Daily blog (blog.kaspersky.com) will be on recess from December 24 through January 8. Between those two dates, you’ll find no new content on the global blog (except
This week we talked with Costin Raiu, Director of Kaspersky Lab’s Global Research and Analysis Team, on the topic of Advanced Persistent Threats and how they may impact businesses. The
We have already talked about keyloggers – malware tools that intercept and record keyboard inputs. Every time you type your credentials to enter a social network, a payment system or
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of
Firefox mandates in its latest update that all Java plug-ins will operate on a click-to-play basis. Google removes a key privacy feature and fixes a serious vulnerability in its Android