A Social Media Interview with Alex Gostev
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
667 articles
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
It’s always frustrating if your smartphone or tablet gets lost or stolen – and that frustration is compounded by the loss of valuable data stored in the device’s memory. Worse
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder
Those looking to tighten the security of their internet browsing experiences have a lot of choices these days. There is a slew of security and privacy related plug-ins available for
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Eugene Kaspersky has had an interesting, varied life, with more than his share of adventures, successes and challenges. He’s seen and done a lot, but when he learned that he
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out
As you already know, Windows 8 has some major differences from Windows 7. In order to provide the best and most secure user experience, we created KIS2013 and KAV2013 modified
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security