What is an Exploit?
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
426 articles
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
In case you weren’t following us during May, here is a list of the most popular articles that were published on Kaspersky Daily last month. Beware of Snapchat The wildly
Have you ever been browsing the Internet and had a banner ad pop up for a product you’ve previously searched for? When you visit a favorite website, does it have
Your device faces a variety of online threats everyday; choosing the best possible protection is vital to guarding its safety. Learn more about the newest version of PURE with the
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
When the U.S. Government comes poking around the world’s major Internet companies asking for customer data, Verizon, AT&T, Apple, and Yahoo are not particularly interested in protecting the general public,
Mother’s Day is a few days away and if you are a last minute shopper, you may be taking to the Internet to try and find that special gift for
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms
The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President Barack Obama had been injured
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
Confusion ensued last week after a well-known security researcher identified a number of incredibly troubling security vulnerabilities in a popular Linksys router developed by Cisco Systems. The networking giant almost
As with any new version of the Windows operating system, Microsoft has not only beefed up the feature set you get with your Windows 8 computer, but also the security.
Most people are now using several devices- PCs, smartphones and tablets that all have access to the internet. However, not all these devices are being equally protected by users; this
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Various Russian media outlets are reporting that Microsoft’s incredibly popular internet phone service, Skype, which is widely relied upon as a secure means to communicate confidential or otherwise sensitive information,
Despite cries and outrage from the security industry that passwords are an inadequate form of authentication for access to computers and online services, so many mechanisms depend on these secret
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues