Cloud vs. Fraud
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
772 articles
Banks and financial institutions. require a special approach to IT Security, and that is why we developed a Kaspersky Fraud Prevention Cloud.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Minidionis is yet another backdoor from the same APT group responsible for CozyDuke, MiniDuke, and CosmicDuke – this time with some “cloud” capabilities.
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works.
The RedOctober operation was hastily wrapped-up just after a Kaspersky Lab’s publication in January 2013, but it was expected to return. And it did.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. According to Kaspersky Lab data, over 200,000 unique malicious samples
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
Everything is about the cloud these days, but as we increasingly store our personal and professional data on remote servers it is essential to know that nothing is 100 percent
What corporate security teams should do about the “viral” AI agent.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Eight digital New Year’s resolutions you absolutely need to keep.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.