A security solution for irregular cases
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
612 articles
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Has your sat nav ever insisted you are somewhere you are clearly not? Welcome to GPS spoofing.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
The Razy Trojan secretly installs malicious extensions for Chrome and Firefox to serve phishing links and steal cryptocurrency.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
Our tools to secure, monitor, and manage customer infrastructure can be integrated with Autotask PSA.
Why doesn’t Kaspersky Lab have an antivirus app for iOS — and what are all those other Internet security suites for Apple mobile devices?
What surprises do machine learning have in store for us? How difficult is it to trick a machine? And will we end up with Skynet and rise of the machines? Let’s take a look.
How one of the key technologies behind the Kaspersky Lab’s antivirus engine came to be.
Creators of ad mailings and spam are very interested in knowing whether you read their messages. This post explains how to protect against e-mail tracking.
A webinar on potential damage and the main risks associated with cloud breaches.
Our first Transparency Center, as well as “software assembly line” and storage of Kaspersky Security Network data, will be located in Switzerland.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company