DDoS in Q2, 2015: evolving trends
Kaspersky Lab has just released its Q2 report on DDoS activities on the Web, showing that this part of the global threat landscape is extremely volatile and permanently evolving.
1182 articles
Kaspersky Lab has just released its Q2 report on DDoS activities on the Web, showing that this part of the global threat landscape is extremely volatile and permanently evolving.
Kaspersky Lab has rolled out a new cyberthreats report covering Q2. While it is consumer-oriented, certain findings are extremely relevant to business.
Apple patched a serious issue in its App Store and iTunes Store, which could have undermined many of the businesses working in this ecosystem.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
If it is not possible to get rid of a risky software for some reason, it is better to exist in a “presumption of guilt” mode, with an efficient security solution keeping it in check and preventing exploits from successful attacks, targeted ones included.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents. In the new version, it became even more dangerous.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
In Q1 of 2015, the amount of spam in the world’s email traffic is less than it was a few years ago, but still too high. Junk mail goes from annoying to dangerous when infected by cybercriminals.
Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
Kaspersky Lab has just released its quarterly report on IT threats evolution. It’s full of woeful figures, showing that threats keep climbing. Judging by dynamics, this trend is here to stay for a time.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
Cybercriminals frequently use spam as the primary channel to spread malware. Of course, this is something we should take care of.
According to a study by Kaspersky Lab and B2B International, only 37% of the organizations surveyed said they currently have measures in place to protect against DDoS-attacks.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.