Infosec 2013: A Review
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
3865 articles
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing your
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home computer or mobile device, or weak and
The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President Barack Obama had been injured
Infosec 2013 kicked off in London in style yesterday, as Chloe Smith MP, Minister for Political and Constitutional Reform, gave the inaugural keynote session on the UK’s cyber security strategy
Adobe’s suite of software offerings is one of the most popular programs in the world — which is precisely why it is also one of the most targeted and exploited
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
As many of you may know, Kaspersky Lab has been the sponsor of Ferrari both in the Challenge series and in Formula 1 since 2010. We are proud to announce
Today we announced a very important addition to the list of our clients. Kaspersky Lab’s security solutions will protect the vast IT infrastructure of the world-renowned Ferrari brand. The deal brings
At this point, Internet Explorer, Google Chrome, Safari, and Mozilla Firefox are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions,
Are you reading the truth or a pack of lies on social networks? Learn to tell the difference with this quick guide. From the poor mutts in dog homes that
Today we announce the release of Kaspersky Security for Virtualization 2.0, the latest version of our security solution for virtual machines using the VMware platform. Integration with new features in VMware
The privacy and censorship conscious among us are certainly familiar with Tor. Short for “The Onion Router,” Tor is a free tool that keeps a user’s Web browsing private and
Even the best-made defenses for your IT infrastructure can easily be breached if they are created without taking into account the possibility of human error. A single visit to an
Applying corporate security policies to devices used by employees, especially mobile ones, is every bit as important as monitoring applications installed on the network or controlling Internet access. The larger
Any workplace should be able to provide all the software staff need to do their jobs effectively. However, if employees are allowed to install and run any application without restriction,
The infrastructure of any company needs reliable protection against both external and internal threats. External threats include malicious programs, phishing attacks, attempts to penetrate a company’s network, and other well-known
Four of the 10 most pressing problems facing businesses are linked to information security, and cyber-threats, the most significant of those four, came a close second in the overall top