
Who doesn’t need antivirus?
An ex-Firefox developer recently said antiviruses are no longer needed. Let’s analyze that claim.
740 articles
An ex-Firefox developer recently said antiviruses are no longer needed. Let’s analyze that claim.
Healthcare technologies and mobile working practices are producing more data than ever before, so there are more opportunities for data to be lost or stolen.
When web services collapse, they bury users’ data under their ruins. How can we solve this problem?
We share our lives on social media. What happens if we get locked out?
In our previous article on this topic, we looked into the history of memory-only attacks, also taking a glance at attack scenarios and appropriate defensive technologies. Now it is time
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Digital healthcare allows ever more non-security trained medical staff to access and share confidential patient data, which builds up a challenge for IT security workers.
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
Ransomware: a brief history, current situation, future predictions and how to solve the problem.
The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.
Lately, tech companies have gone crazy about machine learning. What is machine learning, and what are its implications? Here’s our take on this technology.
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
Kaspersky Lab will be showcasing and offering beta version of Kaspersky Security integration with ConnectWise.
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
Who is responsible when connected devices go on a crime spree?
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
How heuristic analysis and System Watcher work in Kaspersky Internet Security.
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.