Giving Spam a Bad Reputation
Imagine a world where, for every useful message, you also get three advertising, fraudulent or malicious ones in your mailbox. Suddenly the convenience of keeping in touch via email would
“Just because you're paranoid doesn't mean they aren't after you” ― Joseph Heller
261 articles
Imagine a world where, for every useful message, you also get three advertising, fraudulent or malicious ones in your mailbox. Suddenly the convenience of keeping in touch via email would
Facebook’s Like button practically begs to be clicked. It’s easy to “like” an innocuous post that pops in up in your News Feed, or send some Like Love to a
The good news for Apple fans is that the Cupertino technology giant issued a serious security upgrade yesterday by adding two-factor authentication to its users’ Apple ID accounts. The bad
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
The latest round of the “CyberSecurity for the Next Generation” student conference was held at the National University of Singapore, Republic of Singapore, 21 – 23 March 2013. Hear from
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
The latest round of the ‘CyberSecurity for Next Generation 2013’ student conference was held in Singapore on March 21-23. Young guests from Asia-Pacific, the Middle East and Africa took part
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Congratulations to our first stage winner in Kaspersky Lab’s 7 Volcanoes contest, Jenni from the United Kingdom! As a geography teacher she is constantly teaching her students about wonderful, exotic
While each country has its own legislation and borders, cybercriminals perform their activities worldwide. International cooperation is essential to successfully stop them. As a result, Interpol and Kaspersky Lab have
Sergey Novikov, Head of the Global Research and Analysis Team for EEMEA, Kaspersky Lab, shares his thoughts and experiences regarding modern education in the cybersecurity field. Watch the exclusive interview
Various Russian media outlets are reporting that Microsoft’s incredibly popular internet phone service, Skype, which is widely relied upon as a secure means to communicate confidential or otherwise sensitive information,
Kaspersky Lab’s Automatic Exploit Prevention technology cans the vulnerabilities in your programs and block any suspicious actions before they cause any harm.
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Despite cries and outrage from the security industry that passwords are an inadequate form of authentication for access to computers and online services, so many mechanisms depend on these secret
The steady growth in the number of malicious programs targeting the Android operating system was one of the most significant IT security issues in 2011. Today, almost 90% of mobile
Steve Adegbite, Director of Cybersecurity Strategies at Lockheed Martin, explains the “Cyber Kill Chain” in order to keep intruders out and shut down attacks if a system has been breached
Sit back and relax – you’re safe online with Kaspersky Internet Security. It protects your PC from new & unknown threats, safeguards your online banking with Safe Money technology and
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]