Businesses under fire
Four of the 10 most pressing problems facing businesses are linked to information security, and cyber-threats, the most significant of those four, came a close second in the overall top
3908 articles
Four of the 10 most pressing problems facing businesses are linked to information security, and cyber-threats, the most significant of those four, came a close second in the overall top
Smartphones and tablets are now a vital tool for any modern businessman. Many of us cannot imagine life without a mobile assistant which stores our contacts, messages, photos and documents.
The first encryption methods appeared almost immediately after the emergence of writing. Ancient masters of cryptography deliberately missed out letters or substituted them with other symbols in their messages to
Sure, it sounds like a great idea to check into your favorite bar or coffee shop on Facebook, Foursquare, Yelp, or any number of applications that let you make similar
Unfortunately, data theft and credit card fraud have become common worries. We wanted to find out from our Facebook users if they have ever been targeted, so we asked if
All attacks on users’ computers were successfully blocked by Kaspersky Interenet Security 2013 in the independent test conducted by respected Austrian lab, AV-Comparatives. The test with the self-explanatory name “Real-World Protection
Some websites are fraudulent. Stay safe on the Internet using Kaspersky Internet Security with URL Advisor technology.
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
If we’re to believe all the headlines this week, then it appears that the one-time search giant Google has finally shipped off developer-models of Google Glass – their oft-mocked, thoroughly
It’s that time of year again: when you put away your winter clothes, realize you haven’t gone to the gym nearly enough to be ready for swimsuit season — and
There was a time, not that long ago, when if you bought a new PC or mobile phone, you were likely to keep it for a long time. Before the
Confusion ensued last week after a well-known security researcher identified a number of incredibly troubling security vulnerabilities in a popular Linksys router developed by Cisco Systems. The networking giant almost
Everyone loves the hands-free convenience that Bluetooth enables — some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they’re
BlackBerry’s preeminent Z10 smartphone (and other devices running the BlackBerry operating system beyond version 4.5 for that matter) has a feature built-into its messaging service called “Show What I’m Listening
Today is the International Day of Human Space Flight, and we’ve decided to tell you a little about computers in space: what they’re like, what they do and how and
Shop and bank online without worrying about the safety of your financial data – it’s protected by the multi-layered defenses of Safe Money technology included in Kaspersky Internet Security.
Kaspersky Lab analysts are currently investigating a series of targeted attacks against computer game publishers. It turns out that cybercriminals are stealing in-game currency, source code as well as digital
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
As with any new version of the Windows operating system, Microsoft has not only beefed up the feature set you get with your Windows 8 computer, but also the security.
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker