#KLIAS2014 Outcomes: The Cost of APTs is Going Down
This February, Kaspersky Lab held quite an important event: the annual Industry Analyst Summit. This was the third time we invited top security industry professionals to discuss a wide range
1211 articles
This February, Kaspersky Lab held quite an important event: the annual Industry Analyst Summit. This was the third time we invited top security industry professionals to discuss a wide range
Apple in Disgrace In late February, researchers detected a couple of major problems with the operating systems Apple iOS and Mac OS X. The iOS version 7.06 update restored some
We’re continuing the series “Small Business Stories”, in which CEOs of small companies talk about the role IT plays in their general activities and in the protection of their information.
Mr. Vitaly Kamluk, Kaspersky Lab’s security researcher, enters the stage, goes over a certain number of slides, and then proceeds to do a live demo. He warns the audience about
Kaspersky Lab recently published a new survey called “Who’s spying on you” to describe the arising problem of cyber-espionage. In our previous article we pointed out that any company or
Whenever one hears the words ‘cyber espionage’, large-scale campaigns affecting entire national states and transnational corporations such as Aurora, Flame or Duqu come to mind. Unfortunately, cyber espionage doesn’t necessarily
The year started with Intel, AMD and their OEM partners announcing that they would soon release PCs that run both Android and Windows 8.1 at the same time. The pilot
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise
Congrats on being named a Channel Chief two years in a row. How has the past year been for the channel program? Last year we were focused on partner enablement
Game of Expectations Kaspersky Lab’s experts detected phishing newsletters that were supposedly advertising the messenger service, WhatsApp, being released for PC. WhatsApp is an extremely popular messenger for mobile platforms,
At the Mobile World Congress held in Barcelona Kaspersky Lab presented a new platform designed to protect financial transactions on the Web – Kaspersky Fraud Prevention. The solution is primarily
There is a lot of talk these days about cybercriminals growing shrewder. They are less interested in getting notoriety for crashing a number of websites or launching large-scale mail worm
With the threat landscape changing, the methods of protecting corporate resource develop, too. However, the key principles stay the same: know your basic vectors of threats, minimize possible human factor
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we
The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet – from refrigerators and washing machines to irons. Just like
Year after year, there is an expectation for the Kaspersky Lab North American Partner Conference to be something spectacular and this year surely did not fail to meet that expectation.
Today is the second day of Kaspersky Security Analyst Summit 2014 – the security conference initiated by Kaspersky Lab, where our experts, security pros from other companies and independent researchers
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“, dedicated to the current cybersecurity situation and main trends in this field. As
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
American information security experts warned about new DDoS attacks that leverage the Network Time Protocol (NTP) to enhance garbage traffic. The United States Computer Emergency Readiness Team (US-CERT) published a