Kaspersky Incident Communications
In case of a cybersecurity incident, whom should you communicate with inside the company? Which channels should you use — and which ones should you avoid? And how should you react?
14 articles
In case of a cybersecurity incident, whom should you communicate with inside the company? Which channels should you use — and which ones should you avoid? And how should you react?
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
There’s a rumor flying around the Internet that up to 40 million iCloud accounts have been compromised. Now, we normally wait for extra information and corroborating data to back up
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Have you recently noticed some weird suggestions on your Netflix account? Have you seen a new user under your account that you have no idea how it got there? Well,
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
The industry of infosec news (if there is one, after all), while not that similar to cry-wolf Vanity Fair type of media, is constantly agitated and always looking for the
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
We collected the 10 best tweets related to an IT security event in 2014.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.