2014 In CyberSecurity: A Forecast
2014 will be an important year in the development of new cybersecurity threats. Threats related to commercial espionage and new forms of end-user targeting by criminals will likely be present.
2014 will be an important year in the development of new cybersecurity threats. Threats related to commercial espionage and new forms of end-user targeting by criminals will likely be present.
Hello Kaspersky Lab blog readers! We’re always reminding you how important it is to buy licensed products. However, you should remember that not all software sold in stores or online
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?