1055 articles
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Did you have a chance to train your employees in the basics of information security before sending them off to work from home?
Using services and programs that IT doesn’t know about causes problems. We explain how to avoid them.
When it comes to information security, we’re seeing the same mistakes over and over again.
While auditing Web applications, our experts found a vulnerability to enumeration attacks. Here is a description of the problem and how to combat it.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
In the context of the coronavirus pandemic, there is a growing need to protect collaborative software. We updated Kaspersky Security for Microsoft Office 365 and extended the free license period to six months.
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.