Information hygiene at work
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
4004 articles
The concept of information hygiene seems quite paradoxical. However, this phrase is not new, and the problem is acute. We all live in a world of severe information overload, where
They don’t live under a bridge, but they are quite ugly. Patent trolls have been lurking around Kaspersky Lab for years, trying to make a claim that we are using
Do you have a personal computer at home that is not actually personal because it is meant for family use? Do your loved ones use it for work and Internet
In a recent post we wrote about how the line between “work” and “personal” devices today is increasingly blurred. Users will not buy a separate smartphone or a tablet for
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
When a new high-profile attack is revealed–whether it’s a technology company, a government agency or a financial institution that’s targeted–the attention often focuses on the victim and what the attackers
Congratulations to our fourth stage winner in Kaspersky Lab’s 7 Volcanoes contest – Laura from Ireland! Laura entered the contest on behalf of her parents as a surprise gift to thank them
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Your family’s phones or tablets store a lot of precious personal data — so how do you protect them from malware, Internet threats and the risk of loss or theft?
Recently, I had the chance to visit a number of industrial events and could see the evolution of cybersecurity in the industrial field. One of these was the 4th National
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of September 2013. [audio https://media.kasperskydaily.com/wp-content/uploads/sites/92/2017/06/06045555/podcast_september_Brian.mp3] Download podcast for offline listening
Passwords are the main method of authentication for the Internet today. They were yesterday, the day before yesterday, and will probably be that way in the near future too. Accordingly,
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses
There are potential risks that we all face online. These include malware, phishing scams and junk-mail. But there’s an added dimension where children are concerned. They’re less worldly-wise, so they
Passwords, the de facto authenticators, represent a serious security weakness for a number of reasons, chief among those is that humans quite simply tend to create bad passwords in order
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
Our anti-virus products are constantly being tested and improved. Even when a product has been released, we continue to work on updating our packages. Our updates are always aimed at
To complete our series of articles on licensing for Kaspersky Lab products, we would like to touch upon another common case; reinstalling the system. How can you do this without
Although we usually talk about the ways to protect information from threats, today we are going to list several proven and popular ways to lose data and, possibly, even money.
An apparent flaw in Apple’s new operating system for its mobile devices allows anyone to access a user’s contact information and social media accounts without entering the security code to