Deep Dive: 5 Threats Affecting Hardware
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
368 articles
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
The 3Q and 4Q of 2014 were rather successful for Kaspersky Lab: our solutions became acknowledged winners of 11 independent tests (including long-term ones). Europe’s best selling computer magazine —
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
This is the first blog post in a series of posts where I will try to document some of the false perceptions about IT security — and believe me, there
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
The concept of mobile malware working in bond with computer Trojans to steal money via online banking is not new, however Kaspersky Lab Q1 report indicates that it quickly gaining “market share”.
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC. But nevertheless, you have an opportunity
With each passing year, the mobile malware landscape continues to evolve. It’s now driven by groups of criminals working to carry out large scale attacks and earn substantial profits. There