Following in-depth tests between 21 major Internet security solutions, AV-Comparatives has granted Kaspersky Internet Security 2016 the Advanced+ Award for its effective and hassle-free real-world cybersecurity protection
Delivery notifications could dampen the festive mood this holiday as cybercriminals exploit users’ online shopping sprees with phishing messages masquerading as genuine emails from big name delivery brands
Nearly half (44%) of Internet users admit having shared their passwords with somebody or left them visible for people to see, according to the findings of Kaspersky Lab’s recent consumer surveys.
The Kaspersky Security Bulletin Overall Statistics Report for 2015 highlights a new trend: for the first time ever, mobile financial threats rank among the top ten malicious programs designed to steal money
According to recent research from Kaspersky Lab and B2B International, nearly half (48%) of the companies surveyed believe they know the identity and motivation of those behind recent Distributed Denial of Service (DDoS) attacks against them, with many naming competitors as key culprits
Cyberattack tools used against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in the last 12 months
The latest research from Kaspersky Lab and B2B International shows that two-thirds of Internet users are worried about online financial fraud, yet 11% of consumers use no security solution at all to protect themselves
According to Kaspersky Lab, 2015 marked the moment when demand for new malicious programs reached saturation point, as the number of new malware files detected every day by its products fell by 15,000, from 325,000 in 2014 to 310,000
The ongoing war in Syria has seen the number of fraudulent emails targeting the international community rise in recent months, according to a Kaspersky Lab report into spam and phishing trends
Kaspersky Lab’s Global Research and Analysis Team has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of malicious activity in the attacked system