Simply the best!
Independent testing agency MRG Effitas put 16 security products through their paces against a battery of malware. Here are the results.
3897 articles
Independent testing agency MRG Effitas put 16 security products through their paces against a battery of malware. Here are the results.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
Kaspersky Safe Kids helps protect your children from inappropriate content and limit device use time, but kids are potentially able to delete the app. Here’s how to prevent that from happening.
One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
Kaspersky Internet Security and other Kaspersky Lab products are compatible with the latest Windows 10 update.
Encrypted messaging comes to Facebook Messenger for Android and iOS
Kaspersky Lab’s David Emm shares some security concerns he has about Facebook Marketplace.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
Social networking sites know a lot more about you than what you post. These two tools can help you figure out how much more.
Polyglot, aka MarsJoke, had aspirations. It was trying to be the next CTB-Locker — but we developed a cure.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
What are older people doing online, and are they aware of the threats out there?
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
Germany and India officially challenge changes to WhatsApp’s data-sharing policy.
i-Dressup, a community for teenage girls, is actively leaking passwords in plain text.
We have more bad news from the Yahoo hack: Even without a yahoo.com account, you may be at risk.
How criminals use fake Wi-Fi hotspots to steal data, and how you can use our solutions to protect yourself.
You can use Kaspersky Internet Security 2017 to stop the installation of unwanted programs and block bothersome system changes.