Remember the Gawker Media Password Breach of 2010?
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
763 articles
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
There are various ways to assess the threat landscape, but it’s what companies think of it that is most important. We decided to pick the top 10 events of 2014 by a single criterion: the popularity of the corresponding stories. And here is what we came up with.
2014 is over, as are the holidays. Time to look back at the business security highlights of past the year.
The number of corporate-targeting attacks increased this year more than two times compared to 2013. Why?
Kaspersky Lab launches “Targeted Attacks Logbook” – a visual tool to monitor known Advanced Persistent Threats. In this post, we take a look at how to handle this pretty instrument.
Kaspersky Lab experts shared their predictions on the evolution of APT. While these predictions may not come true, they are based on facts and trends already observed.
Sony Pictures Entertainment fell victim to a massive hack. Attackers used destructive malware to bring SPE networks down, while stealing up to 11 TB of data, which included both trade secrets, yellow press fodder, passwords to social networks accounts, and a lot of private information.
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
There are some good reasons to spend years researching high-profile cyberthreats. But we do our best to protect our customers from the latest threats even before the investigation has concluded. Here’s how.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
The newly disclosed Darkhotel APT campaign will surely draw increased scrutiny to hospitality systems’ security worldwide. Hoteliers acknowledge the existence of security problems in their software systems, and many are opting to move these systems into the cloud. Is this a viable solution?
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Antivirus protection is often perceived as a process of simply blocking what is bad. However, it’s as much a process of approving what is good.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.