
Cloud control: Manage IT security from anywhere
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
750 articles
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Minidionis is yet another backdoor from the same APT group responsible for CozyDuke, MiniDuke, and CosmicDuke – this time with some “cloud” capabilities.
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works.
The RedOctober operation was hastily wrapped-up just after a Kaspersky Lab’s publication in January 2013, but it was expected to return. And it did.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. According to Kaspersky Lab data, over 200,000 unique malicious samples
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
Everything is about the cloud these days, but as we increasingly store our personal and professional data on remote servers it is essential to know that nothing is 100 percent
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Most employees are already using personal LLM subscriptions for work tasks. How do you balance staying competitive with preventing data leaks?
A popular developer tool has been trojanized and is uploading secrets to public GitHub repositories. We discuss what’s important to know for both developers and cybersecurity services.
Google experts have demonstrated how complex hardware vulnerabilities in CPUs can be effectively exploited.
We dive into which corporate systems support passkeys, where compatibility falls short, and why we probably won’t be saying goodbye to passwords anytime soon.
Regulation and the evolving threat landscape are driving companies to adopt more resilient forms of employee authentication. Are passkeys a cost-effective and straightforward replacement for traditional passwords?
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
Wi-Fi sensing lets you monitor motion in your home – without cameras or motion sensors. We weigh the pros and cons of this increasingly popular technology.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
Adjust your daily routines to leave as little data about yourself online as possible.
This guide dives into using passkeys to sign in from someone else’s computer, storing them on a removable device, and transferring between devices.