
VPN implementations and their peculiarities
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
1408 articles
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
Cybercriminals are starting to shift their focus from stealing personal data to other actions which bring immediate profit, experts at SANS institute say. At the recent ‘The Seven Most Dangerous
Please stop me if you have heard this before: ‘I don’t need a security solution for my Mac. They are super-secure and are completely immune to viruses.’ Do you believe
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
At the RSA Conference in San Francisco, I sat in on a panel that raised an interesting question in the insecure big data world that we live in. Ian Amit
You know how armies typically move: first come the scouts to make sure everything is ok. Then the heavy troops arrive; at least that was how it used to be
During the RSA Conference in San Francisco Stephen Balkam, Founder and CEO of the Family Online Safety Institute gave a presentation focused on the Risks, Harms and Rewards of our
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
We talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah.
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
Mobile World Congress is always about smartphones. But if you stop looking for them and take a look from a different angle — you’ll find a lot of other stuff.
Recently Samsung introduced the Gear S2 Classic 3G smart watch, which is the first device with eSIM support. Although it is a pilot, this technology is bound to spark a
The morning of November 24, 2014 is engrained into the collective memories of Sony Pictures Entertainment employees. On that day, an unknown cybergang hacked the company’s server, leaked a slew
At the Mobile World Congress 2016 in Barcelona, Eugene Kaspersky and Sandra Alzetta of VISA held a roundtable conversation devoted to the financial security and other related questions. Of course,
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
It seems that there is now a typical scenario for malware evolution. First cybercriminals release a skeleton with basic functions — that piece of malware behaves quietly, showing almost no
Do you stream music on Spotify at home or work? Chances are that you are one of the millions of users to the popular online service. So you should read
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
Every year Kaspersky Lab products take part in a number of short- and long-time tests that are held by independent laboratories. It’s no secret that our solutions continually show high
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However