In recent months, Kaspersky Lab experts have been closely monitoring so-called ‘Darknet’ resources, in particular the Tor network.
Browsing: Malware and Vulnerabilities
Malware in all its forms has become more difficult to spot, but with that, security has been ramped up, with awareness growing from web users
There was a time many moons ago when in an age of innocence Pass The Hash had a whole other meaning.
Detection of emails claiming to be from the popular WhatsApp messenger for smartphones. The messages stated that an attached archive contained a photo
Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013.
My major concern about the Internet of things is that more companies will be adding devices to the network infrastructure with no knowledge of security.
Several statistics gathering engines on the web reveal an interesting picture. Content management systems (CMS) have become far more popular recently
Banks and financial services organisations have been a prime target for hackers for a very long time
NominumTM have announced the launch of its N2 Applications for marketing and customer care. The suite comprises: N2 Care, N2 Engage and N2 Promote.
Tripwire have announced the results of an extensive analysis of security vulnerabilities in Small Office/Home Office (SOHO) wireless routers.