
Remote working and ransomware
The mass shift to working from home has made ransomware an even greater threat.
469 articles
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
While auditing Web applications, our experts found a vulnerability to enumeration attacks. Here is a description of the problem and how to combat it.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
What exactly was certified and how the certification was performed
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
A recent benchmark from Canalys put Kaspersky in the leaders spot for partner satisfaction.