Stolen mobile devices: how much of this is personal business?
IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.
3900 articles
IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
It is widely known in cybersecurity that the door to a data breach is often opened by employees. In what percentage of breaches is an employee directly at fault?
Malvertising is an ambiguous term referring to malicious online advertisements; some cause malware infection while others track user behavior.
A while ago we “celebrated” 10 years since the first smartphone malware emerged. While we made the first Symbian antivirus in 2004, it doesn’t mean that we had no mobile security products before that. It was hard to unearth and boot an antique handheld from early 2000s, and even harder to find, install and launch our old software. Yes, it’s long obsolete, but there’s a reason for all these efforts. Read about it in our new blog post.
Small businesses are unwilling to invest in security solutions – often because they don’t think there are any – designed specifically for their needs. But such solutions do exist.
Kaspersky Endpoint Security proved to be an undisputed champion in Dennis Technology Labs’ testing in Q2, 2014.
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Kaspersky Lab launches Beta Testing of a new version of its enterprise security solution. Service Pack 1 for Kaspersky Endpoint Security 10 for Windows (the software for endpoints) and Kaspersky
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Learn how to avoid becoming a victim of the wireless hack and how to control additional protection measures in our new product.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Expert reviewers are declaring KIS 2015 the best version yet, and one of the best AV products on the market.
Is it even worth applying for popular jobs? The answer is “Yes, absolutely” – as long as you keep in mind a few important points that will help you stand out from the crowd.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.