Uncovers abuse of network read more »
Using TOR makes it more difficult to trace the command-and-control server read more »
Why did third-party have so much access to Target's point of sale systems? read more »
The attack campaign is highly sophisticated and bears the marks of being a state-sponsored operation, the researchers said read more »
The exploit is embedded into documents distributed as email attachments, researchers from Kaspersky Lab said read more »
The update patches a vulnerability for which an exploit was reported in the wild, the company said read more »more news ..
Kaspersky Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Kaspersky In Depth
Symantec said it tried to break the hash with brute force attacks but failed read more »
New technologies like the Intel Xeon E5-2600 product family are coming to market that work at the server processor level read more »
Check out the hot six up-and-coming security companies in the industy read more »
Fequently asked questions about the latest Trojan infeciton read more »
McAfee have released a set of five tips to help ensure that your smartphone remains secure and free of potentially harmful mobile apps read more »
Security don discusses cloud security, an Internet Interpol, WikiLeaks and cyber warfare read more »more in depth ..