Information hygiene at work
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
1211 articles
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
They don’t live under a bridge, but they are quite ugly. Patent trolls have been lurking around Kaspersky Lab for years, trying to make a claim that we are using
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
When a new high-profile attack is revealed–whether it’s a technology company, a government agency or a financial institution that’s targeted–the attention often focuses on the victim and what the attackers
Recently, I had the chance to visit a number of industrial events and could see the evolution of cybersecurity in the industrial field. One of these was the 4th National
Passwords are the main method of authentication for the Internet today. They were yesterday, the day before yesterday, and will probably be that way in the near future too. Accordingly,
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
Although we usually talk about the ways to protect information from threats, today we are going to list several proven and popular ways to lose data and, possibly, even money.
Black Tuesday August the 13th brought numerous challenges to (primarily) corporate users of Microsoft products. The company released patches for critical vulnerabilities in Windows, Exchange Server and Active Directories. As
88% of tablet users and 96% of smartphone owners use personal devices to store important personal information. These figures are from the survey B2B International and Kaspersky Lab cooperatively conducted
The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn’t cause any catastrophic consequences for the users, they
Today’s malware is definitely not the only security threat for individual and corporate users, but the tools of detecting and fighting malware remain fundamental in any security solution. There are
In IDC’s latest “Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares”* report, Kaspersky Lab has been positioned as the third largest Endpoint Security Suite Vendor with a 13% share
Within a few days in the middle of August, reports of massive cyber attacks against the U.S. media surfaced, more specifically, at the Washington Post, CNN and Time, as well
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
The number of IT security incidents involving smartphones and tablets is on the rise, and most companies have no plans to limit the use of personal mobile devices for work-related
Kaspersky Lab today announces the opening of a new flagship European office in central London. Serving as an official ‘hub’ for European employees and customers, the new office will position
Work does not always require an employee’s presence in the office. In many cases it is acceptable, convenient, and sometimes advantageous for the employee to work remotely from a mobile
MDM systems are often not necessary right away for companies with a small number of mobile workers, whose managers often believe their IT-department can handle it effortlessly. But a reality
A modern man cannot imagine his life without mobile devices like smartphones and tablet computers. A portable minicomputer that provides access to the Internet and offers basic features for processing