How the adversary-in-the-middle technique is used in spearphishing attacks
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
15 articles
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Security training aimed at IT teams, service desks, and other technically advanced staff.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
See a few highlights from the RSA Conference 2018 in San Francisco.
A cloud instrument for detailed malware activity analysis.
Even though built-in Office 365 spam filters stop most spam, what gets through can be enough to cause significant damage
How to protect and control workloads in the AWS public cloud
Kaspersky Private Security Network brings users all of the advantages of the cloud without violating regulations or internal security policies.
Today we are going to talk about My Kaspersky. This Web portal lets users manage our security solutions on all of their devices remotely. A brief historical note: My Kaspersky grew
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”