Big Deal: when Machines know better
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
3937 articles
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Big Data concept is the new “big thing” of the last two or three years. While it promises a lot of advantages, there are voices of doubt and reservation. This week we are publishing a series of blog posts dedicated to Big Data, trying to find out what this “big” is about. Stay tuned!
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
The Ferrari plant in Maranello, Italy, is a smart blend of the latest technology and centuries-old skills of craftsmanship. Ferrari is the producer of the best cars in the world, and to stay ahead they often employ newer technologies that later become a major trend elsewhere.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Bullying isn’t new, of course. But technology has made it easier than ever before for bullies to attack the vulnerable. If you’re a parent, take a look at our checklist of top tips for keeping your children safe from cyberbullying.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
A serious elevation-of-privileges vulnerability had been discovered in Linux in late April. Bugs like this are especially problematic for businesses, and require a prompt reaction.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
Yesterday marked the 10 year anniversary of the first smartphone malware being discovered. Today, Cabir worm looks harmless: it doesn’t steal money or passwords, nor does it delete users’ data. But it drains the battery within
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Cabir, the first smartphone virus ever, turns 10. Here are some amusing facts about it.