• Post Of The Day
  • Business
  • Enterprise
  • SMB
  • Threats

Critical vulnerability in Apache Log4j library

Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of…

  • Business
  • Enterprise

Five steps to prevent IT security team burnout

A practical guide for chief information security officers and security operation center managers.

  • News

Transatlantic Cable podcast, episode 231

This week on the Kaspersky podcast, Ahmed, David, and Jeff discuss the $450K cost of…

  • Business
  • Enterprise

A paradigm shift for industrial security: Immunizing factories

Kaspersky IoT Secure Gateway 100: How to protect industrial data whilst preserving business continuity.

  • Business
  • Enterprise
  • SMB

Five reasons mobile apps need protection

Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up…

  • Business
  • Enterprise

MSP market changes in post-pandemic world

Two studies of the MSP and MSSP market development in the context of ubiquitous remote…

  • News

Transatlantic Cable podcast, episode 230

This week on the Kaspersky podcast, Dave and Jag talk about facial recognition for goats,…

  • Privacy
  • Tips

Setting app permissions in iOS 15

How to set app permissions in iOS 15 for maximum privacy and security.

  • Business
  • SMB

What not to keep in your mailbox

Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes,…

  • News

Transatlantic Cable podcast, episode 229

This week on the Kaspersky podcast, Ahmed, David and Jeff discuss Facebook’s haptic glove, Rent…

  • Business
  • Enterprise
  • SMB

Five problems of telehealth

Report on the research about the applied telehealth practices, views on the development and the…

  • Tips

How to survive remote learning

How to stay productive while learning from a distance.

  • Business
  • Enterprise
  • SMB

Invisible implants in source code

Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.

  • Business
  • SMB
  • Threats

Businesses’ proxyware headache

Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.

  • News

Transatlantic Cable podcast, episode 228

Emotet is back, some REvil arrests, and Twitter cryptovigilantes let loose — it’s all happening…

  • Threats

Phishing in Netflix and beyond

We analyze some typical examples of phishing bait for movie streamers.

  • Business
  • Enterprise
  • SMB

Phishing disguised as spam

Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam…

  • Products

More speed, more features with Kaspersky VPN Secure Connection

With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.

  • Tips

Protecting teens’ mental health on social media

As teens spend an increasing amount of time on social media, it’s more important than…

  • Business
  • Enterprise

How to scan files in a public cloud

To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan…

  • News

Transatlantic Cable podcast, episode 227

Squid Games crypto scams, DarkSide ransom, and Facebook decides to shutter its facial recognition system.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Read More