Ransomware / Blockers – A New Approach to Fighting Them
Most of us can no longer imagine a world in which we aren’t digitally connected at all times, and cybercriminals are well aware of this. With the growing importance of
3886 articles
Most of us can no longer imagine a world in which we aren’t digitally connected at all times, and cybercriminals are well aware of this. With the growing importance of
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
As many of you know, Kaspersky Lab sponsors Scuderia Ferrari, the legendary F1 team. We are also the provider of IT security for them. In the last week, just before
The networking giant D-Link has acknowledged and committed to fixing a very serious backdoor vulnerability in a number of its older routers. The vulnerability was uncovered by security researcher Craig
If it seems like the list below is dominated by recent events, that is for good reason: Major media outlets have increasingly poured resources into their websites and social media
The BYOD concept almost immediately became a source of problems for system administrators who also have relatively recently had to deal with mobile malware of an uncontrollable growing number and
On October 17, 2013 the Windows 8.1 update was released. If you are planning on updating your OS to the latest version, pay attention to our Tip of the Week.
The Wi-Fi alliance, an almost absurdly large consortium of communications, technology, and manufacturing companies, has launched an initiative aiming to strengthen the security and reliability public wireless hotspots. Known as
Online behavior tracking by Web advertisement agencies attempting to better target consumers with products and other ads is a pervasive, persistent, and contentious practice on the Internet. The ad firms
The question of ordinary users’ awareness of cyber threats and the scope of their knowledge about them may seem philosophical or rhetorical, but only at first glance. The results of
In 1492, under a charter from the monarchs of Spain, an Italian man named Christopher Columbus severely underestimated the Earth’s circumference, sailing three ships into what he would reportedly die
With more and more people using Macs and other Apple devices, there’s been a rapid growth in the volume of Mac malware and the number of cybercriminals that are targeting
The solution contains a number of functions with similar names that can be somewhat confusing. In this case we are talking about Mobile Device Protection (part of Mobile Device Management)
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defense against having your personal data and your money fall into the hands
When we enter the adult world, we tend to put a lot of care into building and cultivating our reputations. The way we present ourselves and the way others perceive
Don’t waste your time doing routine tasks like updating an antivirus. Make it auto-update itself.
On the web you can find regular discussions about how people used to live without mobile phones. Somehow people lived without them until quite recently, but now it seems unimaginable.
Does your anti-virus seem to slow down your computer’s performance? When applications are lagging, you start randomly changing the anti-virus settings in order to fix the problem, don’t you? There
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Kaspersky Internet Security for Mac recently received an Approved Security Product award by AV Comparatives in a malware protection test run by the independent anti-virus software tester. There’s been a
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this