Overcoming IT infrastructure complexity
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
666 articles
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
We sit down with one of our interns to discuss what it is like to work within Kaspersky Lab.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
We received more accolades from AV-Comparatives in late August, and we would like to take a moment to share them.
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
Kaspersky Lab has just released a new version of Kaspersky Endpoint Security for Mac, specifically for Mac-savvy businesses.
Kaspersky Lab has just received a trove of new awards for one of its business products, Kaspersky Small Office Security.
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Since Windows 10 arrived two days ago, new security-related concerns have surfaced. First and foremost, they’re about control over the data on Windows 10-based PCs and other devices.
These days, ransomware-related news stories look a bit like, well, war chronicles. In fact, this is the consequence of an elevated attention to this particular kind of threat; similar things occurred in early the 2000s when net-worms thrashed the Web.
Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves.
They say history repeats itself and that holds true with revolutionary development. The malware industry has advanced so much that antique ideas are relevant again.
Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
For many people security measures are a “secondary accessory,” and not something that should be cared for first and foremost. This is a common, but innately flawed mode of thinking.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
The necessity of a product that is positioned in-between the enterprise-level suites and home-users solutions became apparent only a few years ago.