
Global IT SECURITY RISKS SURVEY 2015
This report serves as an industry benchmark to help businesses
understand the type and level of IT security threats they face.
568 articles
This report serves as an industry benchmark to help businesses
understand the type and level of IT security threats they face.
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
When the iPhone and app store rolled out, there was a phrase that became ubiquitous to our lives becoming more connected: “There’s an app for that.” Fast-forward to 2016 and
We talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah.
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
At the Mobile World Congress 2016 in Barcelona, Eugene Kaspersky and Sandra Alzetta of VISA held a roundtable conversation devoted to the financial security and other related questions. Of course,
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Believe it or not, math is important. While it may have been easy to roll our eyes at our childhood schoolteachers, human behavior is quite predictable and math helps in
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100
Over the past few months, there has been a lot of hype surrounding Virtual Private Networks or VPN for short. The technology has even found its way into home routers,
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know
Installing a security solution is important, however you just cannot assume that you are done there. Keeping your antivirus databases up-to-date is just as important as the initial install. Kaspersky
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role