BetaNewsThree-quarters of corporate network breaches are via web …BetaNewsAccording to a new report from Kaspersky Lab, 73 percent of successful perimeter breaches on corporate networks in 2017 were achieved using vulnerable web …and more …
Kaspersky Lab detects new variant of ransomware called KeyPass that uses fake installers
Just when people thought ransomware is losing its appeal among cybercriminals, SecureList, Kaspersky Lab’s cyber threat research and reports, has been monitoring a new variant called KeyPass along with other researchers in the security community.
As Nvidia expands in artificial intelligence, Intel defends turf
But Intel processors already are widely used for taking a trained artificial intelligence algorithm and putting it to use, for example by scanning incoming audio and translating that into text-based requests, what is called “inference.” Intel’s chips …
Usuarios de Instagram reportan ‘hackeos’ en sus cuentas
Usuarios de Instagram, la popular red social para subir fotos y vídeos, están reportando ser víctimas de ataques cibernéticos en los que ‘secuestran’ sus perfiles y afirman que no consiguen que se restablezca el acceso. Los ‘hackers’ cambian el nombre …
Why the human factor is an evergreen problem in cybersecurity
The human factor is a key concern for businesses trying to keep networks secure, according to Kaspersky Lab’s State of Industrial Cybersecurity 2018 survey. With 40% of Internet Connection Sharing (ICS) computers undergoing attacks every six months, …
Artificial Intelligence Still Isn’t All That Smart
In the business world, machine learning often goes by the annoying moniker of “artificial intelligence.” That science-fiction buzzword evokes visions of godlike sentient computers, when in fact, the product is much closer to a statistical regression …
AI in FinTech – How Artificial Intelligence is Helping Finance IndustryTechnotification
Kaspersky Lab penetration tests reveal glaring security holes in networks
Every year, Kaspersky Lab’s Security Services department carries out a practical demonstration of possible attack scenarios to help organisations worldwide identify vulnerabilities in their networks and avoid financial, operational and reputational damage.