Inside The Belly of a Cybercrime Investigation
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
3294 articles
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
Steve Adegbite, Director of Cybersecurity Strategies at Lockheed Martin, explains the “Cyber Kill Chain” in order to keep intruders out and shut down attacks if a system has been breached
Sit back and relax – you’re safe online with Kaspersky Internet Security. It protects your PC from new & unknown threats, safeguards your online banking with Safe Money technology and
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]
We spoke with the students and graduates who presented their research at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place at the end of February at
Creating backup copies is one of the most reliable methods of safeguarding important data: whatever happens to your valuable files, you will always have a copy at hand. This is
Watch how Kaspersky Anti-Virus blocks threats and uses cloud-based technology to provide real-time protection. And, yes, it’s fully compatible with Windows 8.
Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
The Kaspersky 7 Volcanoes Expedition is in full swing – in three quick stages Olga Rumyantseva reached the top of Kilimanjaro, the highest volcano in Africa and its highest peak.
The federal government is typically a step behind when it comes to regulating the Internet, but in a timely and significant move the Federal Trade Commission issued a report recently
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
Protect your smartphone not just from malware but phishing sites and prying eyes. You also need to be able to secure your data if your phone’s lost or stolen! Check
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We’ve got
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
The energetic Olga Rumyantseva heads for the second volcano out of the seven that she plans to climb on her own over this year. We asked Olga to tell us