Organizations of all types and sizes face the growing threat of advanced malware, exploits and other cyber attacks targeting sensitive information. Even when a threat is identified, the organization remains vulnerable until it can fully mitigate the threat. Given the use of disparate prevention and response tools and...
The Ukrainian energy sector is being targeted by fresh phishing attacks, the country's computer emergency response team warns. But it's not clear who's behind those campaigns, or a recent malware infection at Kiev's main airport.
Microsoft has patched a new, critical remote code execution vulnerability affecting all versions of Internet Explorer, but it's now only supporting and patching IE 11 and Edge. Potentially, several hundred million users of old IE versions are now at risk.
As the cyberthreats facing the healthcare sector grow ever more sophisticated, CIO John Halamka, M.D., says organizations must launch aggressive security initiatives, including investing in analytics to improve breach detection, plus two other critical steps.
Hundreds of millions of PCs are at risk of being remotely exploited, after a security researcher released proof-of-concept exploit code for separate, newly discovered flaws in software preinstalled on systems by Dell, Lenovo and Toshiba.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
Security on the endpoint took a long time to move away from mere patching, hardening and anti-virus technologies. To fight advanced threats, experts say visibility on endpoints is being transformed by the advent of endpoint detection and response tools.
In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Download this white paper, "Endpoint Security for Business: Technology in Action", to learn about:
Threats you can see and those you can't;
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Unfortunately, this is not the script for a crime drama. Since many victims are willing...
Cyberattacks can be the downfall of an organization's reputation. News headlines are filled with stories of major corporate data breaches across all industries.
To effectively navigate the increasingly sophisticated and complex threat landscape and keep your organization out of these kinds of news stories, you need...
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn't enough.
Kaspersky Lab recommends focusing on prevention and mitigation of advanced threats. Our Global Research and Analysis Team (GReAT) wants to help...
Millions of Android devices are at risk from "Certifi-gate," a flaw that OEMs must patch, Check Point warns. Following Stagefright, Google and some manufacturers have promised to deliver monthly Android patches.
Virtualization and related developments bring significant changes to the architecture of today's data centers. At RSA Conference Asia Pacific & Japan, Cisco's Munawar Hossain defines these changes and outlines the new challenges.
An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.
Keeping track of missing devices is a critical aspect of information security. Ali Solehdin, senior product manager at Absolute Software, discusses Computrace, which helps organizations secure endpoints and the sensitive data those devices contain.