Kaspersky Lab Cybersecurity weekend Part 2: Hacking IoT – practically child’s play
By Ryan Noik 3 May 2019One of the stand out demonstrations at Kaspersky’s Cybersecurity weekend, held in Cape Town this week, was just how easily and quickly a drone can be hijacked. FULL STORY >
Kaspersky Lab Cybersecurity Weekend Part 1: Shedding light on an invisible war
By Ryan Noik 2 May 2019Kaspersky Lab sheds light on the cybercrime landscape and the invisible war that all people, businesses and nations need to face and contend with in the digital era. FULL STORY >
Data breaches are putting digital transformation strategies at risk, finds Kaspersky Lab
By Press Release 30 May 2018Latest Kaspersky Lab study finds data breaches now cost enterprises in the META region (Middle East, Turkey and South Africa) about $1 million. FULL STORY >
Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018
By Press Release 17 May 2018Overall, the number of users attacked with malicious Office documents rose more than four times compared with Q1 2017. In just three months, its share of exploits used in attacks grew to almost 50% - this is double the... FULL STORY >
Kaspersky Lab moving core infrastructure from Russia to Switzerland, opening first Transparency Centre
By Press Release 15 May 2018By the end of 2019, data from customers in Europe will be stored and processed in Zurich. FULL STORY >
Protects much more than passwords – New Kaspersky Password Manager now available
By Press Release 3 May 2018Kaspersky Lab has introduced the new generation of its freemium solution Kaspersky Password Manager. FULL STORY >
Managed services providers may soon be stuck in a Cybersecurity rut, Kaspersky Lab Report warns
By Press Release 18 April 2018With cyberthreats on the rise and affecting businesses around the world, managed services providers (MSPs) view cybersecurity-as-a-service as the major technology trend that will impact their market... FULL STORY >
Cybersecurity, Digital Freedom and Blockchain: Kaspersky Lab joins Enterprise Ethereum Alliance
By Press Release 10 April 2018With a number of blockchain projects already being developed in its internal incubator, Kaspersky Lab is now also joining the Enterprise Ethereum Alliance. FULL STORY >
55% of couples argue about device overuse: The pros and cons of device devotion in relationships
By Press Release 9 April 2018Cccording to the latest Kaspersky Lab study, there are not only pros of “connected love” but also cons that should be taken into account. FULL STORY >
Prilex: POS malware evolves to target chip and PIN-protected cards
By Press Release 19 March 2018Kaspersky Lab researchers have revealed that the group behind the Prilex point-of-sale malware can now turn stolen credit card data into functional plastic cards. FULL STORY >
Smart eye: Kaspersky Lab discovers severe flaws that could transform popular smart cameras into surveillance tool
By Press Release 15 March 2018Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office... FULL STORY >
Slingshot: the spy that came in from the router
By Press Release 12 March 2018Kaspersky Lab researchers have uncovered a sophisticated threat used for cyber-espionage in the Middle East and Africa from at least 2012 until February 2018. FULL STORY >
Olympic False Flag: How infamous Olympic Destroyer malware was designed to confuse cybersecurity community
By Press Release 9 March 2018A new attribution method helped to identify a very sophisticated false flag, says Kaspersky Lab. FULL STORY >
International Women’s Day: Kaspersky Lab study aims to close the gender gap in cybersecurity
By Press Release 7 March 2018The company highlights the importance of encouraging and empowering women to pursue careers in IT. FULL STORY >
Mine a million: Kaspersky Lab identifies sophisticated hacker group earning millions through mining malware
By Press Release 5 March 2018According to Kaspersky Lab researchers, cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software... FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?