What is the cost of a data breach?
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
3957 articles
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
Jeff and Dave discuss a fake Fortnite app, China visiting the dark side of the moon, Facebook breakup, Teensafe, and more.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
A look at how payment information is protected on smartphones that support contactless payments.
A small infographic to remind you what GDPR is and what businesses can do to boost personal data security.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
In this week’s podcast, Jeff and Dave riff on the Chili’s data breach, Facebook’s internal reviews, police falling victim to ransomware, and more.
A traditional approach to cybersecurity is no longer good enough. Dealing with advanced threats requires advanced tools such as endpoint detection and response.
Our first Transparency Center, as well as “software assembly line” and storage of Kaspersky Security Network data, will be located in Switzerland.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Jeff and Ahmed discuss privacy online, the latest on Cambridge Analytica, and more.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
How Twitter’s “not-a-leak” made me realize that remembering passwords no longer works.
If your Kaspersky product tells you something about an “Invalid key file” or ”Integrity violation,” here’s what to do.
This new version of SynAck ransomware uses sophisticated evasion techniques.
Ten mistakes that led to the destruction of the Death Star.
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
The team, led by veteran polar explorer Felicity Aston, met with Eugene Kaspersky on arrival at the North Pole.
Stress relating to technology and cybersecurity is an escalating issue we can’t escape.