RAM control: what you need to know for effective security
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
1219 articles
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
We have received a new patent for a method of countering code injection into a page opened by the client’s browser (a man-in-the-browser attack).
What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
Are you set up to block ransomware from jumping from one machine to your network?
Mobile banking is easy and convenient, but its adoption rate is still far from ideal.
Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.
Novel protection methods often evolve from older ones. Therefore, we decided to write about a method of malware detection that is tried and true — and also cutting-edge.
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
ProjectSauron is obviously a costly attack, but the budget is not invested in ‘rocket science’, but rather in the ‘bugfixing’ after the previous APT campaigns.
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
We use the right approach for every group, showing every employee how they contribute — and how to contribute — to the security of the organization.
In the very near future, we will use the HackerOne platform to launch the Kaspersky Lab Bug Bounty program, which will give outside experts an opportunity to seek bugs in Kaspersky Lab’s products and be rewarded for vulnerabilities they might find.