4003 articles
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Cabir, the first smartphone virus ever, turns 10. Here are some amusing facts about it.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
It’s time to reconsider our stance on data storage, and in the process, perhaps we can force a little cybersecurity education. One solution is to apply “The Three Ps” to every data storage decision a company makes (at least about PII or valuable secrets).
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.
How iOS 8 and Tizen releases affect smartphone market and security landscape.
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
This is a short excerpt from what is said to be unearthed medieval manuscript, describing a way of keeping secrets. While we are not sure it’s authentic, the method described seems quite useful today.
A serious cross site scripting vulnerability was discovered in the popular Twitter application TweetDeck today. Users should revoke access to that app on Twitter as soon as possible.
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Computer ransomware is getting more sophisitcated, while mobile cryptolockers are emerging both in Europe and the U.S.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The entire series of The Сyberworld Survival Guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
OpenSSL reported six new vulnerabilities just eight weeks after Heartbleed. Does it mean that OpenSSL is heading for a disaster, or is it on its way to healing?
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.