Kaspersky 7 Volcanoes: Time for Mount Elbrus
The ancient stratovolcano, Elbrus, is Europe’s highest peak and takes its place amongst the “Seven Summits,” a must for any self-respecting mountaineer. So naturally Olga Rumyantseva could not pass it
668 articles
The ancient stratovolcano, Elbrus, is Europe’s highest peak and takes its place amongst the “Seven Summits,” a must for any self-respecting mountaineer. So naturally Olga Rumyantseva could not pass it
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
You do not often read “repentance” articles in the media when authors describe as they did something evidently stupid and paid for it. Last year one such piece was published
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
The recent incident of personal data being leaked from Facebook’s servers is just one more demonstration that even the best cloud services are not flawless. Therefore, every user should have
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
Targeted attacks gain popularity as a means of cyber-espionage. They get more complex, use sophisticated algorithms and act more stealthily than ever. Even U.S. President Barack Obama voiced his concerns
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
Kaspersky Lab has been awarded by Virus Bulletin magazine once again. During the regular testing of security solutions Kaspersky Endpoint Security 10 for Windows blocked 100% of malware and gave
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
New technological business trends are almost always about investment. First you pay money and after that, if you get lucky, you make your employees happier, achieve tighter security of business
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not
Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home computer or mobile device, or weak and
Today we announce the release of Kaspersky Security for Virtualization 2.0, the latest version of our security solution for virtual machines using the VMware platform. Integration with new features in VMware
Even the best-made defenses for your IT infrastructure can easily be breached if they are created without taking into account the possibility of human error. A single visit to an
Any workplace should be able to provide all the software staff need to do their jobs effectively. However, if employees are allowed to install and run any application without restriction,
The infrastructure of any company needs reliable protection against both external and internal threats. External threats include malicious programs, phishing attacks, attempts to penetrate a company’s network, and other well-known