The most true-to-life horoscope
Astrologers were fooling you all your life. Here is what real horoscope, based on science and machine learning, looks like.
133 articles
Astrologers were fooling you all your life. Here is what real horoscope, based on science and machine learning, looks like.
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
One of the most sophisticated APT campaigns ever analyzed by our experts.
Who hacked the Olympics? How can malware spread over routers? And what’s Sofacy up to?
Security experts highlight potential entry points into healthcare networks and describe relevant cyberthreats
Our experts analyzed last year’s financial cyberthreats, and here is their report
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately
Effective protection of industrial facilities requires permanent monitoring of both information systems and operational processes. We have just the tool.
The newest threats you should know about, and measures worth taking to keep your business and clients safe.
ENISA has published recommendations for information security for IoT devices deployed within critical infrastructure facilities
Kaspersky Private Security Network brings users all of the advantages of the cloud without violating regulations or internal security policies.
Most modern, enterprise-level companies understand the menace of cyberthreats to business. Some of them have tried to solve cybersecurity problems with the help of system administrators and security software, but
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
One day I found out that someone was passing off my photos as their own. Here’s what I did.