The Сyberworld Survival Guide: SMS notifications
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
3983 articles
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Many of the websites that claim to be World Cup streaming services will harm your system and can steal your credit card information, if you let them.
A new criminal campaign targeting a large European bank had been discovered earlier this year – the Luuuk. For one week, criminals managed to steal as much as 500k Euros from 190 accounts, before they hastily withdrew from sight.
Cybercriminals go for small businesses the same way lions go for a herd of antelope: it’s the weakest that will go down. Yet there are a few simple safety rules that will allow your business to stay breach-free.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Big Data concept is the new “big thing” of the last two or three years. While it promises a lot of advantages, there are voices of doubt and reservation. This week we are publishing a series of blog posts dedicated to Big Data, trying to find out what this “big” is about. Stay tuned!
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
The Ferrari plant in Maranello, Italy, is a smart blend of the latest technology and centuries-old skills of craftsmanship. Ferrari is the producer of the best cars in the world, and to stay ahead they often employ newer technologies that later become a major trend elsewhere.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Bullying isn’t new, of course. But technology has made it easier than ever before for bullies to attack the vulnerable. If you’re a parent, take a look at our checklist of top tips for keeping your children safe from cyberbullying.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
A serious elevation-of-privileges vulnerability had been discovered in Linux in late April. Bugs like this are especially problematic for businesses, and require a prompt reaction.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.