Vulnerabilities in the iPhone
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
765 articles
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Kaspersky Lab’s GReAT expert Ryan Naraine offers tips to avoid falling victim to ransomware.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Kaspersky Lab strives for efficient protection and to regularly improve our technology. One of the recent changes affected Kaspersky Security for Virtualization | Light Agent, our security solution for virtual environments. Now it supports one more virtualization platform – Kernel-based Virtual Machine (KVM).
How you can prevent Ransomware on your file share with Kaspersky Lab enterprise solutions.
Cryptolocker was bad, CTB-Locker was even worse, and new Petya ransomware is a freaking disaster.
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
Successful malware writers quickly figured that offering their creations to ‘people-with-a-purpose’ could be very profitable. Yet offering a service proved even more lucrative.
The majority of targeted attacks hitting businesses nowadays are conducted with cyberespionage in mind, harvesting precious business secrets or confidential personal data. But from time to time attackers get up to something completely different – like sabotage.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
So your social media photos are public, great. Ever wonder what could happen when they get stolen?
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numpad. How can that affect your security?
Kaspersky Lab and WISeKey will collaborate to develop security software for wearable devices and the Internet of Things.
Over the first week of 2016, a handful of important cybersecurity news came in, including those directly and indirectly affecting businesses worldwide.
For the first 2016 Kaspersky Business blog post, we’ve chosen Commandments of Office Security, a handful of common problems with cybersecurity in the workplace, and the ways to solve – or at least mitigate – them.
Fix your cybersecurity problems with this 12-month resolution.