Protecting public clouds from common vulnerabilities

Credit to Author: Andrey Pozhogin| Date: Wed, 09 Oct 2019 20:04:50 +0000
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Andrey Pozhogin| Date: Wed, 09 Oct 2019 20:04:50 +0000
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Read More
Credit to Author: Marvin the Robot| Date: Tue, 08 Oct 2019 12:54:20 +0000
Victims of Yatron and FortuneCrypt ransomware can download a decryptor from the No More Ransom website to recover their encrypted files.
Read More
Credit to Author: Marvin the Robot| Date: Mon, 07 Oct 2019 17:26:21 +0000
Here’s why when trying to download Kaspersky Free antivirus you get Kaspersky Security Cloud Free (and why that’s good news).
Read More
Credit to Author: Anastasiya Gridasova| Date: Fri, 04 Oct 2019 14:20:36 +0000
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
Read More
Credit to Author: Marina Mash| Date: Thu, 03 Oct 2019 13:37:51 +0000
The botnet generally propagates through EternalBlue, the same vulnerability that made the WannaCry and NotPetya outbreaks possible.
Read More
Credit to Author: Jeffrey Esposito| Date: Wed, 02 Oct 2019 15:15:29 +0000
On this podcast, Jeff is joined by Oksana, Kate, Julia and Anya in Moscow to discuss what privacy means to them.
Read More
Credit to Author: Kaspersky Team| Date: Tue, 01 Oct 2019 10:55:24 +0000
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
Read More
Credit to Author: Ilja Shatilin| Date: Mon, 30 Sep 2019 11:20:31 +0000
Hacked SIM cards allow spying. We explain how and why.
Read More