Hot summer of 2012
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
1222 articles
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
Contemporary educational institutions in the US are now as computerized as any corporation or government agency and, in the case of technologically oriented universities, sometimes to an even greater extent.
Last week members of CMS Drupal received terrifying news regarding a very serious problem – a massive data breach. The breach included leaked usernames, email addresses, users’ countries of residence
On June 19, Opera Software, the developer of one of the most popular Internet browsers- mainly used on mobile devices, admitted that the company’s internal network infrastructure was attacked and
The large American supermarket chain, Raley’s Family of Fine Stores, which is comprised of 120 stores in California and Nevada, became the target of a “complex criminal cyber-attack.” The company
You do not often read “repentance” articles in the media when authors describe as they did something evidently stupid and paid for it. Last year one such piece was published
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have
Targeted attacks gain popularity as a means of cyber-espionage. They get more complex, use sophisticated algorithms and act more stealthily than ever. Even U.S. President Barack Obama voiced his concerns
Kaspersky Lab held its first annual Government Cybersecurity Forum in Washington, D.C. earlier this week. The overarching conversation related to cybersecurity trends and what America (and other nations) should do
Kaspersky Lab’s security experts have published the first part of a new study of large scale cyber espionage campaign, called NetTraveler, which aimed at 350 large commercial and government organizations
Kaspersky Lab has been awarded by Virus Bulletin magazine once again. During the regular testing of security solutions Kaspersky Endpoint Security 10 for Windows blocked 100% of malware and gave
The technology of dynamic allowlists by Kaspersky Lab has been recognized by the independent institute AV-Test.org.
Kaspersky Lab analysts released a new quarterly report “IT Threat Evolution: Q1 2013”, dedicated to the most important events in the field of information security. The abundance of incidents in the
The Roses Creative Awards are given annually for the most notable achievements in advertising, marketing and design. Initially two distinct awards were given for excellence in design and advertising, but
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,
New technological business trends are almost always about investment. First you pay money and after that, if you get lucky, you make your employees happier, achieve tighter security of business
Today we announced a very important addition to the list of our clients. Kaspersky Lab’s security solutions will protect the vast IT infrastructure of the world-renowned Ferrari brand. The deal brings
Today we announce the release of Kaspersky Security for Virtualization 2.0, the latest version of our security solution for virtual machines using the VMware platform. Integration with new features in VMware
Even the best-made defenses for your IT infrastructure can easily be breached if they are created without taking into account the possibility of human error. A single visit to an
Applying corporate security policies to devices used by employees, especially mobile ones, is every bit as important as monitoring applications installed on the network or controlling Internet access. The larger
Any workplace should be able to provide all the software staff need to do their jobs effectively. However, if employees are allowed to install and run any application without restriction,