Viruses: Back to basics
It is very possible that in the foreseeable future information will be stored in DNA, and the term “virus” will get back to its literal meaning.
697 articles
It is very possible that in the foreseeable future information will be stored in DNA, and the term “virus” will get back to its literal meaning.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
How much do you know about the events that rocked the world of cybersecurity in the past few years? Test yourself!
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
Analysis shows that the attackers are particularly active during the holiday period.
Router manufacturers and ISPs are trying to make Wi-Fi set up as easy as possible — and in the security business, we know e-a-s-y spells trouble.
Facebook regularly changes its security settings. Take a look: A useful new setting may have appeared since the last time you checked.
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Yet another example of an attack against an ATM: This time the cash machine itself is emulated.
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
Careless behavior online can have devastating personal and financial consequences. Here are seven common shortcuts to avoid.
To protect critical infrastructure, industrial facilities need a way to share information.
Three months in, we report on the development of No More Ransom and the goals we’ve already achieved.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Everything you need to know about mobile banking Trojans and how to fight them.
One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
Encrypted messaging comes to Facebook Messenger for Android and iOS
Kaspersky Lab’s David Emm shares some security concerns he has about Facebook Marketplace.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.