Awareness
How botnet “command-and-control” works
Botnet command and control centers come in many different forms – here’s a breakdown of how it works and how…
Read More »An Interview with Vicente Diaz, Kaspersky Lab at Mobile World Congress
Published on Feb 27, 2014 Vicente Diaz of the Global Research and Analysis Team (GReAT) spoke with Kaspersky Daily to discuss…
Read More »Why encryption can be a pain and how we’re fixing that
Encryption often seems not worth the trouble – performance impact on users is just too great for many businesses. But…
Read More »Critical Infrastructure Protection: The Movie
The short video clip on critical infrastructure protection prepared for Kaspersky Security Analyst Summit 2014 #TheSAS2014
Read More »What is Hacking?
A short video on Hacking. This is to show that Hacking or Being a hacker is not always a bad…
Read More »Difference Between Viruses, Worms and Trojans
A short video to explain the difference between virus, worm and trojan horse.
Read More »Protect your Privacy Completely : Web Browsing with TAILS + Tor
Privacy advocates, people who believe in personal liberty, and tinfoil-hat conspiracy theorists, this free and open source system is for…
Read More »Network security threats explained: WiFi
James Lyne explains how hackers can take advantage of the mistakes that are commonly made when setting up wireless networks.
Read More »James Lyne: Everyday cybercrime — and what you can do about it
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps…
Read More »Understanding Botnet in Details
Blackhat 2012 EUROPE – Workshop: Understanding Botnets By Building One Financial botnets are a major threat to the global Financial…
Read More »Fighting Cybercrime in Europe
10th episode of “On the front line” — a programme by the Euronews channel, this time on the subject of…
Read More »