
Security Week 40: the ‘not-really-a-vulnerability’ in WinRAR, an ancient bug in Firefox, and the oops!-update by Microsoft
What is the difference between real and theoretical threats?
3945 articles
What is the difference between real and theoretical threats?
Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life’s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?
Our vocabulary continues to evolve as we see slang enter our lexicon. From Googling to memes once-thought silly words have become accepted. This evolution is also impacting the way we write and punctuate statements online.
Kaspersky Lab recently launched an online quiz “Are you cyber-savvy”, and the first results are in. While oriented towards end-users, this quiz’s results may serve as another alert for businesses, especially those that are online-based.
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
We sit down with one of our interns to discuss what it is like to work within Kaspersky Lab.
While the total amount of companies reporting to experience DDOs attacks is more or less stable over recent years, in 2015 there was a slight increase in the number of businesses considering them the most damaging type of cyberincidents.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Two young individuals were arrested by Dutch police on suspicion of involvement in CoinVault ransomware attacks.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
When you purchase software, you automatically agreed that your device complies with systems requirements defined by the software vendor. That’s why you should always read them carefully before ever buying anything.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
If the idea of “hacking-back” against cybercriminals who have harmed you or your company has seized you, your executive team, or your spouse as a reasonable thing to do, read
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Kaspersky Lab, together with B2B International, has conducted a new survey of IT security risks.
New variants of the “legendary” banking Trojan Carbanak are making the rounds on the Web, so far noticed in Europe and the United States.
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
Call it retribution, justice, or just plain revenge: few films are as satisfying as when the bad guy (or gal) gets what they deserve in the end. But vigilante movies