Kaspersky Industry Analyst Summit 2014 starts today
Kaspersky Lab’s third annual Industry Analyst Summit is an exclusive invite only event held on February 5-7, 2014 in the Dominican Republic. The event has grown steadily each year and
1211 articles
Kaspersky Lab’s third annual Industry Analyst Summit is an exclusive invite only event held on February 5-7, 2014 in the Dominican Republic. The event has grown steadily each year and
Kaspersky Lab published a survey entitled “The threat landscape: A practical guide from the Kaspersky Lab experts“. The survey focuses on businesses, which are now becoming the main objects of
Readers who follow our information security digests may have already noticed several exotic incidents and malware campaigns, which took place over the past three months. Some of them deserve special
Online payments have remained one of the most vulnerable sections of the IT perimeter. Most banks and payment systems now have two-factor authentication. However, not all of them have instituted
Gartner has just released their 2014 Magic Quadrant for Endpoint Protection Platforms. I’m very pleased to announce that, for the third year in a row, Gartner has included Kaspersky Lab
About 39% of commercial companies in the past two years have experienced information security incidents generated by vulnerabilities in legitimate software. This data is presented in the survey “Global Corporate
The Christmas and New Year holidays, alas, were not a pretext for any real decrease in the number of information security incidents, as experts and users continue to face malware
We are starting a series of articles “Small business security stories” in which executives of formally small business companies talk about the role of IT and particularly data protection in
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
The Problem One of the most effective and dangerous ways to run malicious software on a victim’s computer is by exploiting vulnerabilities in popular applications or within the operating system.
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
The problem Any company regardless of the level of maturity possesses some valuable information which having got into the hands unscrupulous individuals can put an end not just to the
In December 2013 information security incidents proliferated, unfortunately. Even if the number of incidents remained within the average values, their significance, alas, was not moderate. The interests of millions of
Passwords. They are a curse. However many of them you try remember, they are being forgotten. No matter how many of them you write down on paper they get lost.
This week we talked with Costin Raiu, Director of Kaspersky Lab’s Global Research and Analysis Team, on the topic of Advanced Persistent Threats and how they may impact businesses. The
There is a joke about a note in a letter saying “Burn after reading.” It’s not the highest degree of secrecy. The best form of secrecy would be “Eat before
The Problem At present, even very small companies store information that could cause irreparable damage to their financial future if it fell into the wrong hands. An example of this
Sony Corp. underwent a large-scale fiasco in April 2011, when a security breach affected tens of millions of people. The intruders stole the personal data of many users along with
As many as 4.2 million attacks using Java exploits were repelled by our Automatic Exploit Prevention system between September 2012 and August 2013. This number indicates two points. The first
The Problem We often hear from small business owners that the modest size of their companies provides them with “invisibility protection”. Employees believe that their organization and its activities are
It was a very typical situation of “yesterday it worked!” In the morning, the accountant’s laptop would not turn on. More precisely, it did turn on but the operating system