More than just an Antivirus, p.1: When and why antiviruses appeared
Is it still correct to use the term “antivirus?” Cybersecurity today is much more than just antiviruses; still essential, but alone it is no longer enough.
3899 articles
Is it still correct to use the term “antivirus?” Cybersecurity today is much more than just antiviruses; still essential, but alone it is no longer enough.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Apple patched a serious issue in its App Store and iTunes Store, which could have undermined many of the businesses working in this ecosystem.
History, tradition, passion and belonging to the world of motorsport. The 24 hours of SPA was all that and so much more
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Windows 10 was launched to general availability on July 29th. The feedback so far is mixed, which isn’t unusual with new versions of Windows. Some say it’s the best Windows since XP, some call for caution. Security-wise and business-wise it looks promising.
Confronting cyberbullies? Behave smart; don’t do what mockers expect from you. Check these tips to keep the situation under control.
Since Windows 10 arrived two days ago, new security-related concerns have surfaced. First and foremost, they’re about control over the data on Windows 10-based PCs and other devices.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Among all of its promised security enhancements, Microsoft also said that updates will be performed as a “service”: Users will receive new features at no charge for the “supported lifetime” of the device it is installed on.
Kaspersky Lab launches the new versions of its flagship products, designed with privacy concerns in mind.
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
If it is not possible to get rid of a risky software for some reason, it is better to exist in a “presumption of guilt” mode, with an efficient security solution keeping it in check and preventing exploits from successful attacks, targeted ones included.
What should you do if you use Kaspersky Lab products and you’re looking to upgrade your operating system to Windows 10?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Top-level IT security pros believe there’s a significant, unaddressed gap between enterprise security priorities and the serious threats that keep them awake at night.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
Minidionis is yet another backdoor from the same APT group responsible for CozyDuke, MiniDuke, and CosmicDuke – this time with some “cloud” capabilities.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays