How to test your protection quality?
Similar to car crash testing, you’re better off avoiding performing PC security tests yourself. Here’s what the pros have to say for a better, more-trustworthy approach.
892 articles
Similar to car crash testing, you’re better off avoiding performing PC security tests yourself. Here’s what the pros have to say for a better, more-trustworthy approach.
Banks require new tools to prevent fraudsters from getting to others’ money and Kaspersky Lab’s new Fraud Prevention platform is just the tool to use.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
March brought with it a host of new security stories, and with those stories came our continued promise to keep you informed while providing protection against cybercriminals. From our interactive
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
Internet companies are doing their best to protect users and bring them better security solutions. The same goes for Google, which recently announced that the Chrome browser will now be
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as
Major sporting events always attract the attention of cybercriminals, and there’s no reason to think the Brazil World Cup will be any different. With group stage matches kicking off in
Loyal Kaspersky Daily readers are already aware of the recent mobile security trends: the hottest topic among cybercriminals are mobile banking Trojans. When you do your banking on a smartphone,
Game of Expectations Kaspersky Lab’s experts detected phishing newsletters that were supposedly advertising the messenger service, WhatsApp, being released for PC. WhatsApp is an extremely popular messenger for mobile platforms,
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
The biggest annual event in the mobile industry, Mobile World Congress, started yesterday in sunny Barcelona. From the beginning, it has brought some amazing and unexpected news that will likely
With each passing year, the mobile malware landscape continues to evolve. It’s now driven by groups of criminals working to carry out large scale attacks and earn substantial profits. There
There is a lot of talk these days about cybercriminals growing shrewder. They are less interested in getting notoriety for crashing a number of websites or launching large-scale mail worm
The WhatsApp acquisition by Facebook made headlines yesterday because of the record sum paid by the social media giant for the messaging startup. That’s a whopping $19 billion for a
The Syrian Electronic Army (SEA) has struck again, this time attacking the account records of more than a million Forbes readers and contributors. A total of 1,071,963 users were affected
With the threat landscape changing, the methods of protecting corporate resource develop, too. However, the key principles stay the same: know your basic vectors of threats, minimize possible human factor
During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we