Viruses

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Partner Content
Threat Predictions for Connected Life in 2018

Kaspersky Lab’s experts look at the main cyberthreats facing connected businesses over the coming 12 months, based on the trends seen during the year. For 2018, we decided to extract some top predictions that also have big implications for everyday connected life.  

Partner Content
IT threat evolution Q3 2017

In July, we reported on the recent activities of a targeted attack group called ‘Spring Dragon’ (also known as LotusBlossom), whose activities data back to 2012. 

Partner Content
Using legitimate tools to hide malicious code

The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity.

Partner Content
DDoS attacks in Q3 2017

In the third quarter of 2017, the trends of the preceding quarters continued to develop further.

Partner Content
BlackOasis APT and new targeted attacks leveraging zero-day exploit

Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix.

Partner Content
Different Types of SSL Certificates

We all are familiar with the various types of SSL certificates, used to enhance the security quotient of the websites. 

Partner Content
How SSL certificate prevents phishing on your website?

Phishing is one of the security challenges that businesses, as well as individuals, face keeping their valuable information safe.  

Partner Content
The Trust is broken when private keys are misappropriated

In March 2015, Ponemon Institute published a report which analyzed the business failures associated with compromised company keys and certificates. 

Partner Content
A guide to install SSL certificate

SSL іѕ a ѕесurіtу protocol, which dеѕсrіbеs hоw algorithms should be used, since Sесurе Sосkеtѕ Lауеr (SSL) is a ѕtаndаrd ѕесurіtу technology fоr еѕtаblіѕhіng an еnсrурtеd lіnk bеtwееn a server аnd a сlіеnt, tурісаllу a wеb server (wеbѕіtе) and a browser, оr a mаіl ѕеrvеr аnd a mаіl сlіеnt, keeping in mind the security your business we are providing a guide on how to install ssl certificate.

Partner Content
To avoid online security threats, buy SSL certificate online

Various threats exist in online shopping, business/bank transactions, exchange confidential data or defense and security used for. 

Partner Content
The 3 keys to faster threat response
One of the top three concerns is about the Security team’s ability to detect an attack in progress, while there’s still time to do something about it.