The case of the county-killing ransomware
Ransomware just took down an entire county in North Carolina. How did it happen, and what can your organization do to stay safe?
777 articles
Ransomware just took down an entire county in North Carolina. How did it happen, and what can your organization do to stay safe?
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
Kaspersky Lab looks ahead to the main threats likely to affect the financial industry in 2018.
Getting a job in cybersecurity, loving it, and keeping it.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
How to Address Incident Response Challenges Introduction This year, Kaspersky Lab’s quarterly threat reports highlighted significant developments in the world of advanced attacks and epidemic outbreaks, with the infamous WannaCry
Most of those leaks could have been prevented with a timely audit of the IT infrastructure.
Alex Moiseev addresses the issue of transformations that happen when a business starts working with enterprises.
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
MSP: Trends, challenges and the keys to success in managed security in 2017
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
Love the convenience and features of Dropbox but need better security? Here are some alternatives.
Managed service providers and value-added resellers are the common types of information security suppliers for SMBs. Whom will they choose?
With connected cars, it is vital to implement strong cybersecurity from the very start. Our experts stand ready to lend a hand.
Even Mac users take risks when shopping online. Fortunately, we can help.