First quarter 2013: report on major threats
Kaspersky Lab analysts released a new quarterly report “IT Threat Evolution: Q1 2013”, dedicated to the most important events in the field of information security. The abundance of incidents in the
1210 articles
Kaspersky Lab analysts released a new quarterly report “IT Threat Evolution: Q1 2013”, dedicated to the most important events in the field of information security. The abundance of incidents in the
The Roses Creative Awards are given annually for the most notable achievements in advertising, marketing and design. Initially two distinct awards were given for excellence in design and advertising, but
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,
New technological business trends are almost always about investment. First you pay money and after that, if you get lucky, you make your employees happier, achieve tighter security of business
Today we announced a very important addition to the list of our clients. Kaspersky Lab’s security solutions will protect the vast IT infrastructure of the world-renowned Ferrari brand. The deal brings
Today we announce the release of Kaspersky Security for Virtualization 2.0, the latest version of our security solution for virtual machines using the VMware platform. Integration with new features in VMware
Even the best-made defenses for your IT infrastructure can easily be breached if they are created without taking into account the possibility of human error. A single visit to an
Applying corporate security policies to devices used by employees, especially mobile ones, is every bit as important as monitoring applications installed on the network or controlling Internet access. The larger
Any workplace should be able to provide all the software staff need to do their jobs effectively. However, if employees are allowed to install and run any application without restriction,
The infrastructure of any company needs reliable protection against both external and internal threats. External threats include malicious programs, phishing attacks, attempts to penetrate a company’s network, and other well-known
Four of the 10 most pressing problems facing businesses are linked to information security, and cyber-threats, the most significant of those four, came a close second in the overall top
Smartphones and tablets are now a vital tool for any modern businessman. Many of us cannot imagine life without a mobile assistant which stores our contacts, messages, photos and documents.
The first encryption methods appeared almost immediately after the emergence of writing. Ancient masters of cryptography deliberately missed out letters or substituted them with other symbols in their messages to