Who should teach the staff the basics of IT security
Do companies need to take care of their personnel’s IT education today? This issue is controversial because on the one hand it is quite difficult to find people nowadays who
1222 articles
Do companies need to take care of their personnel’s IT education today? This issue is controversial because on the one hand it is quite difficult to find people nowadays who
Social networking has long become a consistent part of the “digital routine” for web users. Whereas system administrators and business owners have considered Facebook and other similar resources more as
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
This week Kaspersky Lab announced a strategic partnership with Vertu, the manufacturer of luxury mobile phones. Thanks to the agreement between the two companies, all users of Android-based Vertu smartphones
Kurt Baumgartner, targeted attack expert and the principle security researcher at Kaspersky Lab, sat on a panel discussing how the global market for trafficking financial information has changed, how it
In this short podcast Kurt Baumgartner, Kaspersky Lab Principal Security Researcher, shares his views on what current corporate IT security threats are, why it is important to install patches, and
The BYOD concept almost immediately became a source of problems for system administrators who also have relatively recently had to deal with mobile malware of an uncontrollable growing number and
The question of ordinary users’ awareness of cyber threats and the scope of their knowledge about them may seem philosophical or rhetorical, but only at first glance. The results of
The solution contains a number of functions with similar names that can be somewhat confusing. In this case we are talking about Mobile Device Protection (part of Mobile Device Management)
On the web you can find regular discussions about how people used to live without mobile phones. Somehow people lived without them until quite recently, but now it seems unimaginable.
Very small businesses, including private enterprises and companies with fewer than 25 people involved, are the foundation of the economic structure of the developed and of many developing countries without
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
They don’t live under a bridge, but they are quite ugly. Patent trolls have been lurking around Kaspersky Lab for years, trying to make a claim that we are using
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
When a new high-profile attack is revealed–whether it’s a technology company, a government agency or a financial institution that’s targeted–the attention often focuses on the victim and what the attackers
Recently, I had the chance to visit a number of industrial events and could see the evolution of cybersecurity in the industrial field. One of these was the 4th National
Passwords are the main method of authentication for the Internet today. They were yesterday, the day before yesterday, and will probably be that way in the near future too. Accordingly,
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
Although we usually talk about the ways to protect information from threats, today we are going to list several proven and popular ways to lose data and, possibly, even money.
Black Tuesday August the 13th brought numerous challenges to (primarily) corporate users of Microsoft products. The company released patches for critical vulnerabilities in Windows, Exchange Server and Active Directories. As