
Little Red Riding Hood and the Wolf-in-the-Middle
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
97 articles
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
Cheats for multiplayer games are tantamount to malware, and their use in competitions to cybercrime.
Collaboration tools can become a vector for malware propagation.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
Three real-world examples to illustrate the dangers of digital clutter.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
Our new partner program: What customers should know about Kaspersky United.
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
Case study: An analysis of insufficient safety practices at a small advertising agency.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
How businesses globally handle personally identifiable information.
Our Security Services folks published a report on the errors they see most — here they give advice on how to make your infrastructure more cyberresilient.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.