
How to protect legacy IT systems
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
62 articles
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Who evaluates security solutions, and how? We report the past year’s tests and awards.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
Imagine a security solution that adapts to your lifestyle and protects you wherever you need it. We’ve designed that solution — take a look at Kaspersky Security Cloud.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Our infographics will help you find the security solution that suits you best.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
Kaspersky Free Antivirus provides reliable and, yes, free protection for Windows machines
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Living online is more comfortable than ever — do you really still need a helmet?
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
How to choose an antivirus solution without falling for advertising tricks.