If not us, then who
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
1183 articles
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
What is sextortion, and how can we protect ourselves and our children?
In the very near future, we will use the HackerOne platform to launch the Kaspersky Lab Bug Bounty program, which will give outside experts an opportunity to seek bugs in Kaspersky Lab’s products and be rewarded for vulnerabilities they might find.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
On July 27, members of Kaspersky Lab’s GReAT will sit down on Reddit, where you can ask them absolutely anything.
On July 27, members of Kaspersky Lab’s GReAT will sit down on Reddit, where you can ask them absolutely anything.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Kaspersky Lab has patented technology enabling our software to detect man-in-the-middle (MitM) attacks, beloved of authors of financial malware.
Smart MSPs craft security software proposals for SMBs and offer security systems management services that eliminate the need for in-house information security specialists. Not every service provider is good for small companies, but the most successful MSPs are focused on this segment.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Despite the persistent myth of security-by-default, virtual infrastructures need protection every bit as much as physical ones. Almost all existing threats are relevant for virtual machines, too.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
Our survey questioned consumers – 97% of whom had travelled to another country during the past 12 months – about their digital habits abroad. It found that in the world of work and leisure, we are a well-travelled lot, but we tend to leave our digital security at home.
An overview of the 10-year anniversary of Kaspersky Lab’s fan club.
Security should be multilayered, and use of allowlists is appropriate as one of the security levels.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.