
Protecting workstations: How not to overblock
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
1344 articles
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
The hidden dangers of out-of-office messages.
Mobile World Congress 2019 recapped: 5G, Internet of Things, ultrasonic fingerprint sensors, and artificial intelligence.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
At Mobile World Congress 2019, our experts presented a study on the security of Motorica smart artificial limbs.
“Security awareness” means different things to different people. Here’s what we mean when talking about this subject.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
Using only publicly available sources, how much can you find out about someone?
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
Our new partner program: What customers should know about Kaspersky United.
Burnout caused by routine is a problem not only for employees, but for the entire company.
A new online education platform automates security awareness training for companies of any size.
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
Antispam expert tips: How to send mass e-mails right — so they don’t get flagged as spam.
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.