Five problems of telehealth
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
657 articles
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading.
We based our new threat intelligence management platform on Kaspersky CyberTrace.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
We’re acquiring an SD-WAN provider to upgrade our enterprise portfolio with SASE and reinforce XDR.
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
Kaspersky’s Ask the Analyst service will ease access to our expertise.
On October’s Patch Tuesday, Microsoft patched 71 vulnerabilities, several of which are particularly serious.
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
How attackers are most apt to get into target companies’ infrastructure.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
Testing 11 advanced security solutions against the latest ransomware threats.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.