
Targeted attack mitigation: everything can go wrong
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
740 articles
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
Are you set up to block ransomware from jumping from one machine to your network?
Evgeny Chereshnev, professional cyborg, talks about fascinating new jobs that will emerge in the near future.
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
Novel protection methods often evolve from older ones. Therefore, we decided to write about a method of malware detection that is tried and true — and also cutting-edge.
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Smart MSPs craft security software proposals for SMBs and offer security systems management services that eliminate the need for in-house information security specialists. Not every service provider is good for small companies, but the most successful MSPs are focused on this segment.
Despite the persistent myth of security-by-default, virtual infrastructures need protection every bit as much as physical ones. Almost all existing threats are relevant for virtual machines, too.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Security should be multilayered, and use of allowlists is appropriate as one of the security levels.
A recent story suggests Google is secretly recording your conversations and discussions. Are they really doing that?
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Hospital pays ransomware ransom, does not get files back.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Kaspersky Lab’s GReAT expert Ryan Naraine offers tips to avoid falling victim to ransomware.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Kaspersky Lab strives for efficient protection and to regularly improve our technology. One of the recent changes affected Kaspersky Security for Virtualization | Light Agent, our security solution for virtual environments. Now it supports one more virtualization platform – Kernel-based Virtual Machine (KVM).