Tip of the week: How to upgrade Kaspersky Internet Security
You will no longer need to download the installer and manually upgrade to the newest version of Kaspersky Internet Security; your antivirus will do it automatically for you!
3900 articles
You will no longer need to download the installer and manually upgrade to the newest version of Kaspersky Internet Security; your antivirus will do it automatically for you!
A data access policy becomes an issue for any company as soon as it accumulates a considerable amount of valuable and sensitive data. That doesn’t mean the policy is always in place when it should be, or that it’s implemented properly.
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
Can a business be “partially” prepared to ward off cyberthreats? That’s up for debate, but it seems there is little difference between “partial protection” and no protection at all.
Vulnerabilities vary. Some are considered critical, some – less problematic; their severity is determined by a few well-known factors such as ease of exploitability and popularity of software. But, no matter their differences they all require serious attention at a constant level, so that when the next Shellshock-like incident occurs, it won’t take cybersecurity world by surprise.
Antivirus protection is often perceived as a process of simply blocking what is bad. However, it’s as much a process of approving what is good.
Finally, we have arrived at a solution that may be convenient for all users: Maintenance Release 1 adds advanced scan settings to Kaspersky Internet Security 2015.
The recent developments with “big bugs” such as Heartbleed and Shellshock created a global security strain, with many questions emerging. Both bugs were open-source software-related, but indirectly they would constitute a threat to Windows-based infrastructure. In this post we review a few scenarios of an attack on mostly Windows-based network with Linux servers at certain points.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
Almost three dozen computers are required by Ferrari engineers to analyze everything happening with a racecar and decide on the maintenance. However, there are other computers in the paddock, very unusual ones.
What changed in Sochi since Olympic games? Does infrastructure suit Grand Prix? Let’s find out together.
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.
APT is a term often mentioned in cybersecurity bulletins. Here’s what you need to know to understand it.
IT workers routinely set up limited privileges for all users for security sake. However, the users are extremely suspicious about these sorts of limitations, assuming (sometimes reasonably) that it will affect the workflow. Is there a way to mitigate these contradictions?
Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands.
With the Parental Control component, you can not only limit the time that your child spends on the computer, but you can also establish restricted applications.
Using a trojan malware with the Russian name, Tyupkin, hackers made cash withdrawals without so much as accessing bank accounts.
Interpol just released an alert regarding cyber-attacks targeting multiple ATMs around the world. During the course of a forensic investigation performed by Kaspersky Lab, researchers discovered a piece of malware infecting ATMs that allowed attackers to empty the cash machines via direct manipulation, stealing millions of dollars.
2014 is making its way into Cybersecurity history books with two global-scale software bugs discovered over 6 months. They are obviously not the last ones, and it is actually a good thing.