Threats in Q2 2013: 100,000+ malicious apps for mobile devices
Kaspersky Lab has published its report on the evolution of threats in the second quarter of 2013. This period has been marked with a number of security incidents of different
357 articles
Kaspersky Lab has published its report on the evolution of threats in the second quarter of 2013. This period has been marked with a number of security incidents of different
It’s always good to have a real expert answering your questions. We’ve found the best of the best – members of Kaspersky’s Global Research and Analysis Team (GReAT), the research
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Kaspersky Lab analysts released a new quarterly report “IT Threat Evolution: Q1 2013”, dedicated to the most important events in the field of information security. The abundance of incidents in the
Continued from Part I Smartphones and Tablets Smartphones and tablets are no different from PCs in terms of the amount of corporate data stored on them. E-mail access, corporate documents,
As with any new version of the Windows operating system, Microsoft has not only beefed up the feature set you get with your Windows 8 computer, but also the security.
Just a few years ago, it was rare to find someone who had more than one or maybe two Internet-connected devices in their home. Now, you’d have to look high
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
The steady growth in the number of malicious programs targeting the Android operating system was one of the most significant IT security issues in 2011. Today, almost 90% of mobile
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
In recent years, cybercriminals have stepped up their efforts to get hold of users’ money. Credit card numbers, login details for online banking, passwords and codes – all this and
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the mobile platform with a variety of malware
A report out earlier this year indicated that robbing banks in the UK is a risky business, and not very lucrative at that: Bank burglars in Great Britain net an
Depending on how you look at it, the security built into Apple’s latest desktop operating system is either a masterstroke in computer protection or the latest twist in the company’s
If you own an Android device, your phone could soon be used against you. Research released in late September introduced a new tool that targets Android devices by taking control