What is APT?
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
1074 articles
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
It can be very tempting to instantly share the most exciting moments of your vacation with relatives and maybe make your friends a little bit jealous. That’s why we usually
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
Your device faces a variety of online threats everyday; choosing the best possible protection is vital to guarding its safety. Learn more about the newest version of PURE with the
Microsoft (and Adobe for that matter) released a slew of security updates in the May 2013 edition of their monthly patch Tuesday release. As always, if your machine isn’t set
Mother’s Day is a few days away and if you are a last minute shopper, you may be taking to the Internet to try and find that special gift for
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Organized cybercriminals have become adept at accessing consumers’ online bank accounts, exploiting either vulnerabilities in the Web-based application you access from your home computer or mobile device, or weak and
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
Are you reading the truth or a pack of lies on social networks? Learn to tell the difference with this quick guide. From the poor mutts in dog homes that
Four of the 10 most pressing problems facing businesses are linked to information security, and cyber-threats, the most significant of those four, came a close second in the overall top
Smartphones and tablets are now a vital tool for any modern businessman. Many of us cannot imagine life without a mobile assistant which stores our contacts, messages, photos and documents.
The first encryption methods appeared almost immediately after the emergence of writing. Ancient masters of cryptography deliberately missed out letters or substituted them with other symbols in their messages to
Kaspersky Lab analysts are currently investigating a series of targeted attacks against computer game publishers. It turns out that cybercriminals are stealing in-game currency, source code as well as digital
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
While each country has its own legislation and borders, cybercriminals perform their activities worldwide. International cooperation is essential to successfully stop them. As a result, Interpol and Kaspersky Lab have
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service