{"id":2295,"date":"2013-09-03T12:20:46","date_gmt":"2013-09-03T16:20:46","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2295"},"modified":"2020-12-10T22:21:55","modified_gmt":"2020-12-10T18:21:55","slug":"best-august-posts","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/best-august-posts\/2295\/","title":{"rendered":"A Monthly Roundup: Best August Posts"},"content":{"rendered":"<p>August has come and gone, you\u2019re home from vacation and you\u2019re ready to settle back into your routine. So make sure you\u2019re prepared for the month ahead by catching yourself up on our top blog posts from August!<\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/signs-of-malware-infection\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>10 Signs of a Malware Infection<\/b><\/a><b><\/b><\/p>\n<p>Even if you\u2019re following all of our tips to keep your digital hardware protected, it\u2019s possible you could still fall victim to malware. If you\u2019re worried about your system getting infected keep your eye out for some of the common signs, like unexpected crashes, a slow system, excessive hard drive activity, strange windows, peculiar messages, bad program activity, random network activity, erratic email, your IP address being added to denylist and unexpected antivirus disabling. If you notice one of these warning signs happening, or if you\u2019re just looking to stay guarded against an attack, we recommend running a <a href=\"https:\/\/usa.kaspersky.com\/downloads\/free-anti-virus-scan\" target=\"_blank\" rel=\"noopener\">security scan<\/a>. This will keep you on top of any potential hazards your computer may be up against.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/usb-hygiene\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>USB Hygiene<\/b><\/a><\/p>\n<p>You\u2019re already aware of the threats you\u2019re up against online, but have you considered the possible need to ward off attacks on your removable devices? These devices, like your USB sticks, could easily fall under attack without your knowledge. Following simple steps like configuring your OS to avoid running anything from USBs, keeping your OS updated, avoiding the copying of executable files and keeping your personal and work drives separate should keep you safe.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/kaspersky-internet-security-wins-another-top-independent-award\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>Kaspersky Internet Security Wins Another Top Independent Award<\/b><\/a><b><\/b><\/p>\n<p>We\u2019re pleased to announce <a href=\"http:\/\/kaspersky.com\/products\/home\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> was recently awarded first place and received\u00a0<a href=\"http:\/\/www.av-comparatives.org\/wp-content\/uploads\/2013\/07\/avc_prot_2013a_en.pdf\" target=\"_blank\" rel=\"noopener nofollow\">AV-Comparatives\u2019<\/a>\u00a0highest Advanced + award in a four month test conducted by independent researchers. AV-Comparatives is one of the most authoritative international testing organizations, and has repeatedly been offered high awards by IT experts for the methodology it uses to test products. Kaspersky Lab\u2019s mission is to keep all users free from cyber security fears, so we\u2019re proud to be able to offer\u00a0the most secure solution available to our consumers.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/all-zero-day-exploits-blocked-once-again\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>All zero-day exploits blocked! Once again.<\/b><\/a><b><\/b><\/p>\n<p>Kaspersky\u00a0<a title=\"Internet Security\" href=\"https:\/\/www.kaspersky.com\/products\/home\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">Internet Security<\/a>\u00a0recently showed 100% efficiency in blocking Zero-day threats in\u00a0a two-month long test conducted by the independent lab AV-Test. Zero-day threats are the most effective way for attackers to infect your computer. In this type of attack, hackers will go after unpatched vulnerabilities in your system and then turn around and sell any found exploits for tens of thousands of dollars. However, you can feel safer if you\u2019re using KIS, knowing it blocked 100% of Zero-day threats during testing and scored 16.5 points out of a possible 18 for its protection capabilities, performance and usability.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/class-of-2014\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>Welcome the Class of 2014<\/b><\/a><b><\/b><\/p>\n<p>Kaspersky Lab has officially released its new 2014 versions of\u00a0<a title=\"Kaspersky Anti-Virus\" href=\"https:\/\/www.kaspersky.com\/products\/home\/anti-virus\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti-Virus<\/a>\u00a0and Kaspersky <a title=\"Internet Security\" href=\"https:\/\/www.kaspersky.com\/products\/home\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">Internet Security<\/a>. Both products include new features, like proprietary ZETA Shield antivirus technology (which performs an in-depth scan of data files to identify exploits and malware that may hide deep inside your system), and the all-new Trusted Applications mode, and they also include enhancements to existing technologies like Automatic Exploit Prevention technology and Safe Money. You can purchase both products via Kaspersky Lab\u2019s\u00a0<a href=\"https:\/\/www.kaspersky.com\/estore\/\" target=\"_blank\" rel=\"noopener nofollow\">online store<\/a>, or if you\u2019re a current customer, you can upgrade free of charge from your previous version for the remainder of your existing license period.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"http:\/\/blog.kaspersky.co.ae\/are-you-a-secret-cybercriminal\/\" target=\"_blank\" rel=\"noopener nofollow\"><b>Are You A Secret Cybercriminal?<\/b><\/a><b><\/b><\/p>\n<p>Botnets are common tools now being used by attackers to commit cybercrimes, which allow them to engage millions of computers at once, making it much more difficult for authorities to find a source. The terrifying thing is, your computer could be engaged in a botnet attack without you even noticing. Activities like spamming, fraud, the distribution of malware, or the downloading and watching of illegal content could all be happening through your device without your knowledge. Using a <a href=\"https:\/\/www.kaspersky.com\/home-security\" target=\"_blank\" rel=\"noopener nofollow\">dedicated security software<\/a>\u00a0is your best bet against this type of attack, so be sure you\u2019re keeping yourself guarded.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>August has come and gone, you\u2019re home from vacation and you\u2019re ready to settle back into your routine. So make sure you\u2019re prepared for the month ahead by catching yourself<\/p>\n","protected":false},"author":189,"featured_media":2296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[352],"class_list":{"0":"post-2295","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-kaspersky-lab"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/best-august-posts\/2295\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/best-august-posts\/2387\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/best-august-posts\/2477\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/best-august-posts\/2327\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/best-august-posts\/2633\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/best-august-posts\/1532\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/best-august-posts\/2633\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/best-august-posts\/2633\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/kaspersky-lab\/","name":"Kaspersky Lab"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2295"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2295\/revisions"}],"predecessor-version":[{"id":17692,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2295\/revisions\/17692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2296"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}