Good security habits for everyone
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
448 articles
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term “RAT” is usually associated with the software used for criminal or malicious purposes.
A look at what the “threat landscape” is comprised of for businesses.
Kaspersky Lab has just released its Q2 report on DDoS activities on the Web, showing that this part of the global threat landscape is extremely volatile and permanently evolving.
It’s not feasible to call a security solution, either for individual users or for businesses, “an antivirus.” There’s more than that.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
Earlier this year, Kaspersky Lab’s products received commendations from a number of respected independent testing labs. Here are a few pertaining to our business-oriented products.
Kaspersky Lab’s regular reports on threat dynamics and trends are called “IT Threat Evolution” not just for catchy word’s sake. IT threats are improving well in accordance with the laws of evolution – i.e. “natural selection”.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
The primary issue here is the real cost of free offers. Hola’s stance is almost honest: You want free services? You have something that is of use to us – your idle or not-so-idle resources. If you don’t want them to be used by us, there is a paid tier for you.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Ransomware is a huge problem nowadays, with new examples circulating on a regular basis. Learn how to protect yourself.
Kaspersky Lab experts have investigated one of the most active APTs (Advanced Persistent Threats) in Asia, operating specifically around the South China Sea area. It was named “Naikon” after the “nokian” User-Agent substring within an attack components’ code.
Mid-April in Singapore was pretty hot not only because of tropical climate, but also because of INTERPOL World – a huge conference/exhibition organized by INTERPOL to give security product vendors
Technologies which seemed like they were from science fiction yesterday, are entering our everyday lives. One such tech is direct neural interfaces.
With an increasing amount of people using mobile devices for work, security of the data stored therein has become a hot topic. And since people also use mobile devices to access their finances, that makes them a prime target for cybercriminals. Android is the most popular mobile OS in the world right now, and the most targeted. How are users attacked and what is the current security status of Android?
Recently Interpol, Microsoft and Kaspersky Lab revealed and the shut down of a huge botnet which zombified about 770,000 PCs worldwide. Check this story out and then check your PC
The world of ubiquitous connected devices is almost here, and it’s so eagerly anticipated that it becoming a reality seems inevitable. Anticipation, however, doesn’t necessarily mean that we are going
Today we discuss the most important news on information security from January.