The wrong way to use passwords
Is there anything worse than “12345” password? Only “12345” password, used for all your accounts.
454 articles
Is there anything worse than “12345” password? Only “12345” password, used for all your accounts.
Here are some simple yet effective ways to protect your files from infection by ransomware.
The Russian Mafia is a long-standing media staple in the West, portrayed with many myths, but reality is possibly surpassing all of them.
According to a study by Kaspersky Lab and B2B International, every cyber-incident is costly to businesses: In 2015, losses due to cyberattacks for SMBs averaged $38K.
Since mid-October, several major software vendors have released a number of security announcements and updates, most of them serious or outward critical.
While the total amount of companies reporting to experience DDOs attacks is more or less stable over recent years, in 2015 there was a slight increase in the number of businesses considering them the most damaging type of cyberincidents.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
RAT stands for Remote Administration Tool. While it may sound rather innocuous, the term “RAT” is usually associated with the software used for criminal or malicious purposes.
A look at what the “threat landscape” is comprised of for businesses.
Kaspersky Lab has just released its Q2 report on DDoS activities on the Web, showing that this part of the global threat landscape is extremely volatile and permanently evolving.
It’s not feasible to call a security solution, either for individual users or for businesses, “an antivirus.” There’s more than that.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
Earlier this year, Kaspersky Lab’s products received commendations from a number of respected independent testing labs. Here are a few pertaining to our business-oriented products.
Kaspersky Lab’s regular reports on threat dynamics and trends are called “IT Threat Evolution” not just for catchy word’s sake. IT threats are improving well in accordance with the laws of evolution – i.e. “natural selection”.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
The primary issue here is the real cost of free offers. Hola’s stance is almost honest: You want free services? You have something that is of use to us – your idle or not-so-idle resources. If you don’t want them to be used by us, there is a paid tier for you.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Ransomware is a huge problem nowadays, with new examples circulating on a regular basis. Learn how to protect yourself.
Kaspersky Lab experts have investigated one of the most active APTs (Advanced Persistent Threats) in Asia, operating specifically around the South China Sea area. It was named “Naikon” after the “nokian” User-Agent substring within an attack components’ code.