The Сyberworld Survival Guide: Child
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
3983 articles
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.
Microsoft hit hard at No-IP.com, a dynamic DNS service which was in active use by cybercriminals. However, the “collateral damage” toll appeared to be a little too high.
New Kaspersky Lab’s survey shows VSB owners are well aware of IT threats, but their priorities lie elsewhere and the “immunity by obscurity” approach is a bit too common.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Kaspersky Lab’s Intrusion Detection Systems now detects RDP brutforce attack attempts, and the statistics gathered since early June looks quite displeasing.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.
Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.