Man-on-the-side – peculiar attack
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
233 articles
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
And more importantly — how to stop your passwords from being used by cybercriminals.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
Kaspersky VPN Secure Connection is the clear winner in tests of VPN performance, privacy, and transparency carried out by the independent IT-security research institute AV-TEST, and is recognized as the institute’s “Approved Virtual Private Network Solution”.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
Here are some simple tips to protect your funds from fraudsters, phishers and carders when shopping online.
Seriously, don’t do it. A Kaspersky study of malware spreading in China shows why it’s always a bad idea.
Introducing a bunch of new powerful features in Kaspersky VPN Secure Connection, which make the app even more convenient and helpful.
We explain how the NullMixer dropper can download numerous Trojans onto a device.
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how attackers can steal your credentials and how you can prevent it.
Meet the new Kaspersky: We introduce our new product line and tell you about the improvements our home users can expect.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
Our experts studied the shadow market for initial access to corporate infrastructure.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Our experts studied the WinDealer malware created by the LuoYu APT group.
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.