Social networks: a threat source and a business resource
The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn’t cause any catastrophic consequences for the users, they
1182 articles
The middle of August was marked by several reports of Facebook security issues, all of them quite scandalous. Even though they didn’t cause any catastrophic consequences for the users, they
Most people bought their first antivirus program to run on a single computer – but that was five, ten or even fifteen years ago. The world has changed, and our
Record number of visitors at Gamescom this year Last week, the world’s largest gaming convention, Gamescom, took place in Cologne for the third year running. The many innovations and exclusive
What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: “What makes
A modern man cannot imagine his life without mobile devices like smartphones and tablet computers. A portable minicomputer that provides access to the Internet and offers basic features for processing
According to the cloud-based Kaspersky Security Network, about 200,000 new malware samples emerge every day, compared to 125,000 just a year ago. The price of poor-quality protection against cyber threats
Kaspersky Lab has published its report on the evolution of threats in the second quarter of 2013. This period has been marked with a number of security incidents of different
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Everyday life and online shopping are inseparable. One plastic card allows us to fulfill practically every whim from a pizza to a car, allows us to pay bills and transfer
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Las Vegas – On the last day of July and the first day of August, a Roman empire-themed hotel and casino in the the Mojave Desert played host to what
It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia. We have
Myths and prejudices are inevitable companions to any branch of knowledge, and the information security sphere is no exception, no matter how practical it is. This article will briefly touch
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
Contemporary educational institutions in the US are now as computerized as any corporation or government agency and, in the case of technologically oriented universities, sometimes to an even greater extent.
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
Kaspersky Labs security products have taken home multiple awards from independent testing groups in recent weeks, and that trend continued with the announcement that its Android smartphone solution, Kaspersky Mobile
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
Extortion, blackmail and ransom requests have always been cornerstones of criminal activity. In today’s global internet economy, criminals are adapting their techniques by attempting to extort money from people using
The recent incident of personal data being leaked from Facebook’s servers is just one more demonstration that even the best cloud services are not flawless. Therefore, every user should have