
Advanced cyberthreats, demystified
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
756 articles
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Smart MSPs craft security software proposals for SMBs and offer security systems management services that eliminate the need for in-house information security specialists. Not every service provider is good for small companies, but the most successful MSPs are focused on this segment.
Despite the persistent myth of security-by-default, virtual infrastructures need protection every bit as much as physical ones. Almost all existing threats are relevant for virtual machines, too.
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.
Security should be multilayered, and use of allowlists is appropriate as one of the security levels.
A recent story suggests Google is secretly recording your conversations and discussions. Are they really doing that?
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Hospital pays ransomware ransom, does not get files back.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Kaspersky Lab’s GReAT expert Ryan Naraine offers tips to avoid falling victim to ransomware.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Kaspersky Lab strives for efficient protection and to regularly improve our technology. One of the recent changes affected Kaspersky Security for Virtualization | Light Agent, our security solution for virtual environments. Now it supports one more virtualization platform – Kernel-based Virtual Machine (KVM).
How you can prevent Ransomware on your file share with Kaspersky Lab enterprise solutions.
Cryptolocker was bad, CTB-Locker was even worse, and new Petya ransomware is a freaking disaster.
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.