Simple defense against complex attacks
An integrated approach arms even small companies with automated tools that repel complex attacks.
127 articles
An integrated approach arms even small companies with automated tools that repel complex attacks.
The abundance of work-related cloud tools and services calls for smart password handling.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
Did you have a chance to train your employees in the basics of information security before sending them off to work from home?
Using services and programs that IT doesn’t know about causes problems. We explain how to avoid them.
While auditing Web applications, our experts found a vulnerability to enumeration attacks. Here is a description of the problem and how to combat it.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
In the context of the coronavirus pandemic, there is a growing need to protect collaborative software. We updated Kaspersky Security for Microsoft Office 365 and extended the free license period to six months.
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.