Impressive results on the anti-APT front
Credit to Author: Oleg Glebov| Date: Thu, 03 Aug 2017 09:22:10 +0000
Kaspersky Anti-Targeted Attack: 100% threats detected with 0 false positives in ICSA Labs certification test.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Oleg Glebov| Date: Thu, 03 Aug 2017 09:22:10 +0000
Kaspersky Anti-Targeted Attack: 100% threats detected with 0 false positives in ICSA Labs certification test.
Read MoreCredit to Author: Serge Malenkovich| Date: Wed, 02 Aug 2017 10:12:08 +0000
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
Read MoreCredit to Author: Jeffrey Esposito| Date: Mon, 31 Jul 2017 15:06:10 +0000
For the past 20 years, Kaspersky Lab has been saving the world. This e-book shares business best practices that the company has learned over the past two decades.
Read MoreCredit to Author: Ryan Delany| Date: Mon, 31 Jul 2017 12:00:23 +0000
As a managed service provider, your customers have entrusted you to manage their IT infrastructure and their security so it’s important that you are making the right choices to secure their environments and keep cyber criminals at bay. In my years of working with our Managed Service Provider partners, I’ve seen a number of mistakes…
Credit to Author: Jeffrey Esposito| Date: Fri, 28 Jul 2017 13:08:40 +0000
We hope that you find these five papers helpful in building out training for your staff
Read MoreCredit to Author: Wendy Zamora| Date: Thu, 27 Jul 2017 16:00:52 +0000
![]() | |
| Learn about the state of ransomware among SMBs and other critical security issues in a report conducted by Osterman Research and sponsored by Malwarebytes. Categories: Tags: infographicransomwaresmall business ransomwaresmall businesses |
The post The state of ransomware among SMBs appeared first on Malwarebytes Labs.
Read MoreCredit to Author: William “Bill” Malik| Date: Mon, 24 Jul 2017 13:00:01 +0000
Organizations manage risk in three ways: they accept it, they take out insurance against it, or they take active measures to diminish its potential impact. These active measures commonly include deploying or enhancing (or removing) technology, updating policies and procedures, instituting training and awareness programs, revising their third-party agreements, and in some cases, modifying their…
Credit to Author: Justin Foster| Date: Wed, 19 Jul 2017 12:00:45 +0000
This year’s Black Hat® conference is right around the corner. Now, amazingly, in its 20th year, Black Hat is one of the world’s top gathering of information security professionals. Friends in the industry refer to this as “Security Summer Camp” and it’s true, between the training, briefings, arsenal, and business hall, Black Hat is chocked…