Connecting with care: How ready is healthcare IT?
Digital healthcare allows ever more non-security trained medical staff to access and share confidential patient data, which builds up a challenge for IT security workers.
1278 articles
Digital healthcare allows ever more non-security trained medical staff to access and share confidential patient data, which builds up a challenge for IT security workers.
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
At VB2016, Juan Andrés Guerrero-Saade and Brian Bartholomew of GReAT discussed why APT attribution is not easy.
The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.
Kaspersky Lab is giving MSPs a chance to get in on the ground floor of an exciting new integration of security and remote monitoring and management tools.
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
Analysis shows that the attackers are particularly active during the holiday period.
Kaspersky Lab will be showcasing and offering beta version of Kaspersky Security integration with ConnectWise.
Forrester Research interviewed vendors and customers to evaluate top endpoint security providers.
Who is responsible when connected devices go on a crime spree?
Yet another example of an attack against an ATM: This time the cash machine itself is emulated.
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
To protect critical infrastructure, industrial facilities need a way to share information.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.
Fundamentally Kaspersky Private Security Network is the same cloud service Kaspersky Security Network, but we redesigned it to work strictly within the customer’s infrastructure. It therefore ensures the privacy of all data processed.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
Virtual Desktop Infrastructure is now standard in many organizations. It is as much necessary to set up proper security for virtual systems as it is for the physical infrastructure.
Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.