Viruses

Microsoft's Windows Defender antimalware targets scareware apps

While Microsoft's Windows Defender frowned upon "optimizer" or "cleaner" apps that didn't explain what they did, it's drawing the line on "scareware" apps that tell you that your PC will be ruined if you don't pay up.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Partner Content
Threat Predictions for Connected Life in 2018

Kaspersky Lab’s experts look at the main cyberthreats facing connected businesses over the coming 12 months, based on the trends seen during the year. For 2018, we decided to extract some top predictions that also have big implications for everyday connected life.  

Partner Content
IT threat evolution Q3 2017

In July, we reported on the recent activities of a targeted attack group called ‘Spring Dragon’ (also known as LotusBlossom), whose activities data back to 2012. 

Partner Content
Using legitimate tools to hide malicious code

The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity.

Partner Content
DDoS attacks in Q3 2017

In the third quarter of 2017, the trends of the preceding quarters continued to develop further.

Partner Content
BlackOasis APT and new targeted attacks leveraging zero-day exploit

Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix.

Partner Content
Different Types of SSL Certificates

We all are familiar with the various types of SSL certificates, used to enhance the security quotient of the websites. 

Partner Content
How SSL certificate prevents phishing on your website?

Phishing is one of the security challenges that businesses, as well as individuals, face keeping their valuable information safe.  

Partner Content
The Trust is broken when private keys are misappropriated

In March 2015, Ponemon Institute published a report which analyzed the business failures associated with compromised company keys and certificates.