No hotbed for cybercriminals: preventing valuable data leaks
The Problem At present, even very small companies store information that could cause irreparable damage to their financial future if it fell into the wrong hands. An example of this
3966 articles
The Problem At present, even very small companies store information that could cause irreparable damage to their financial future if it fell into the wrong hands. An example of this
Sony Corp. underwent a large-scale fiasco in April 2011, when a security breach affected tens of millions of people. The intruders stole the personal data of many users along with
We all know that working on a computer for hours can affect our health. Our eyes and back need rest regularly. However, sometimes we are too busy and we forget
Information security issues are of greater importance today than ever, and they should be a concern for everyone. The people who can address their concerns to a real expert are
It’s that time of year when you’re buying new computers for yourself, your family or your business. And because you want to take care of the items you spend good
2013 will be remembered by both security professionals and everyday people for the number of events that took place in information security. Various incidences, from Edward Snowden’s revelations to the
As many as 4.2 million attacks using Java exploits were repelled by our Automatic Exploit Prevention system between September 2012 and August 2013. This number indicates two points. The first
Being a careful and consistent user, you might have read the License Agreement for the product that is installed on your computer. Today we would like to draw your attention
It is more important than ever during the holiday season that parents monitor and protect their childrens’ web activities. That’s because kids with toys on the brain – so basically
The Problem We often hear from small business owners that the modest size of their companies provides them with “invisibility protection”. Employees believe that their organization and its activities are
From takeoff to landing, the U.S. Federal Aviation Administration and its counterpart in the European Union have cleared the use of computers and mobile devices, though flyers will still be
It was a very typical situation of “yesterday it worked!” In the morning, the accountant’s laptop would not turn on. More precisely, it did turn on but the operating system
Any of your passwords, be it for email, social networks or online banking hold value for cybercriminals, because almost any stolen account can be used in fraud schemes. It’s no
A Hull, UK-based developer operating under the pseudonym DoctorBeet came to realize in early November that his LG Smart TV was actually gathering a quite a bit of information about
In everyday life we encounter a lot of negative things, such as violence, aggression, and brutality. It is often impossible to protect children from such information in the real world,
We’re officially into the month of December, which means another month of posts has passed. If you missed anything from November, not to worry, we’ve rounded up some highlights to
In-app purchases are the Holy Grail of revenue for app producers, especially those who make free gaming apps. The hook is that you love the game so much once you
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of November 2013. Download podcast for offline listening
The worldwide spread of corporate initiatives like IT Consumerization and Bring Your Own Device makes it necessary to build a return on investment (ROI) model in these promising areas. The
In the U.S. many organizations offer the day after Thanksgiving, which falls on a Thursday, to their workers as a holiday. Brick and mortar American retailers have capitalized on this