What kind of passwords do people use
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
3383 articles
			
		With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
			
		Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
			
		Despite cries and outrage from the security industry that passwords are an inadequate form of authentication for access to computers and online services, so many mechanisms depend on these secret
			
		The steady growth in the number of malicious programs targeting the Android operating system was one of the most significant IT security issues in 2011. Today, almost 90% of mobile
			
		Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
			
		Steve Adegbite, Director of Cybersecurity Strategies at Lockheed Martin, explains the “Cyber Kill Chain” in order to keep intruders out and shut down attacks if a system has been breached
			
		Sit back and relax – you’re safe online with Kaspersky Internet Security. It protects your PC from new & unknown threats, safeguards your online banking with Safe Money technology and
			
		Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
			
		David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]
			
		We spoke with the students and graduates who presented their research at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place at the end of February at
			
		Creating backup copies is one of the most reliable methods of safeguarding important data: whatever happens to your valuable files, you will always have a copy at hand. This is
			
		Watch how Kaspersky Anti-Virus blocks threats and uses cloud-based technology to provide real-time protection. And, yes, it’s fully compatible with Windows 8.
			
		Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
			
		The Kaspersky 7 Volcanoes Expedition is in full swing – in three quick stages Olga Rumyantseva reached the top of Kilimanjaro, the highest volcano in Africa and its highest peak.
			
		The federal government is typically a step behind when it comes to regulating the Internet, but in a timely and significant move the Federal Trade Commission issued a report recently
			
		Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
			
		User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
			
		While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
			
		The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
			
		Protect your smartphone not just from malware but phishing sites and prying eyes. You also need to be able to secure your data if your phone’s lost or stolen! Check
			
		The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or