Very Small Business IT Security Issues
Very small businesses, including private enterprises and companies with fewer than 25 people involved, are the foundation of the economic structure of the developed and of many developing countries without
3886 articles
Very small businesses, including private enterprises and companies with fewer than 25 people involved, are the foundation of the economic structure of the developed and of many developing countries without
Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field.
With 125,000 new malicious programs appearing every single day — antivirus protection is a necessity, not a luxury. Your PC needs effective antivirus defense and you deserve an antivirus solution
Today is the Eugene Kaspersky’s birthday. A new year of his life just started, and you can see in our infographic that this life is quite active.
Gaming has been around for decades, and with all of the new advancements that have been made in technology throughout the years have come advancements in the way we game.
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Another month has quietly slipped away and you’ve found yourself wondering if you’re all caught up on our articles from September. Not to worry, we’ve rounded up our top posts
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
They don’t live under a bridge, but they are quite ugly. Patent trolls have been lurking around Kaspersky Lab for years, trying to make a claim that we are using
Do you have a personal computer at home that is not actually personal because it is meant for family use? Do your loved ones use it for work and Internet
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
When a new high-profile attack is revealed–whether it’s a technology company, a government agency or a financial institution that’s targeted–the attention often focuses on the victim and what the attackers
Congratulations to our fourth stage winner in Kaspersky Lab’s 7 Volcanoes contest – Laura from Ireland! Laura entered the contest on behalf of her parents as a surprise gift to thank them
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Your family’s phones or tablets store a lot of precious personal data — so how do you protect them from malware, Internet threats and the risk of loss or theft?
Recently, I had the chance to visit a number of industrial events and could see the evolution of cybersecurity in the industrial field. One of these was the 4th National
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of September 2013. [audio https://media.kasperskydaily.com/wp-content/uploads/sites/103/2017/06/06045555/podcast_september_Brian.mp3] Download podcast for offline listening
Passwords are the main method of authentication for the Internet today. They were yesterday, the day before yesterday, and will probably be that way in the near future too. Accordingly,
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses