Kaspersky Incident Communications
In case of a cybersecurity incident, whom should you communicate with inside the company? Which channels should you use — and which ones should you avoid? And how should you react?
18 articles
In case of a cybersecurity incident, whom should you communicate with inside the company? Which channels should you use — and which ones should you avoid? And how should you react?
Facebook has been breached, and malefactors gained access to some 50 million accounts. We offer some quick tips for your safety.
Your data may move off-site, but does that mean you’re not responsible for it?
Most of those leaks could have been prevented with a timely audit of the IT infrastructure.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Manufacturers need to change their mindset when it comes to the IoT
At SAS 2016 Sergey Lozhkin revealed how he hacked his friend’s hospital and medical equipment.
Netflix accounts have been compromised and sold on the Dark Web. Find out how to see if yours was.
VTech, a company that manufactures electronic learning devices, baby monitors, smart toys announced that information from 5 million customer accounts were accessed in an attack.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
We collected the 10 best tweets related to an IT security event in 2014.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.