firewalls

SSL cеrtіfісаtе for website security

SSL cеrtіfісаtе for website security

Sесurе Sосkеt Layer (SSl certificate or HTTPS) сеrtіfісаtеѕ wеrе designed and dеvеlореd bу Netscape tо сrеаtе a ѕесurе tunnel whеn transferring ѕеnѕіtіvе data between site uѕеrѕ and wеb hоѕtѕ. 

The future of cyber security

The future of cyber security

The cyber security is always evolving and you, as a business or as a consumer, need to be ready to adapt to the new technologies, regulations and strategies that will help to develop a safer and more secure internet.

Jimmy Nukebot: from Neutrino with love

Jimmy Nukebot: from Neutrino with love

In one of our previous articles, we analyzed the NeutrinoPOS banker as an example of a constantly evolving malware family. A week after publication, this Neutrino modification delivered up a new malicious program classified by Kaspersky Lab as Trojan-Banker.Win32.Jimmy.  

IT threat evolution Q2 2017

IT threat evolution Q2 2017

The threat from ransomware continues to grow. Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers. In May, we saw the biggest ransomware epidemic in history, called WannaCry.  

IT threat evolution Q2 2017. Statistics

IT threat evolution Q2 2017. Statistics

According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world.

APT Trends report Q2 2017

APT Trends report Q2 2017

Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. 

Market Guide for Information-Centric Endpoint and Mobile Protection

Market Guide for Information-Centric Endpoint and Mobile Protection

In a world that emphasizes connectivity, mobility, sharing and cloud services, business information flows continuously in and out of endpoint devices. Security and risk management leaders must develop a portfolio of solutions to address different aspects of encryption and boundary defense.

Load More