Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • Much of the internet is not accessible by search engines, and is known as the deep web. Since technology allows for illegal opportunities, the dark web is part of the internet where strange things & cybercrime can occur. Visit Kaspersky Lab at goo.gl/oM3Gj8 to learn more about the deep web and our products. While most of the deep web is benign, places like the dark web are host to everything from...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • SAS X-World is the place where technology and adventure merge. Come celebrate 10 editions of the world famous Security Analyst Summit, explore the landscape, network with your peers and collaborate to save the world. Stay tuned at @KasperskySAS #TheSAS2018

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • It’s possible for applications to be installed in your browser, or your homepage or default search engine changed, without your consent. In this video, we will show you how to prevent the hidden installation of unwanted applications and browser extensions on your computer. For more information about Application Manager: http://support.kaspersky.com/13625.

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • The Internet of things is a new paradigm that is changing the world before our very eyes. It could make our world safer, improve our health, save us time and money, reduce waste and add a new dimension to production control and life in general. The IoT concept encompasses a huge variety of appliances, gadgets, technologies, software and communication protocols. This heterogeneous environment gene...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • Kaspersky Industrial CyberSecurity is a holistic portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMIs, engineering workstations, PLCs, network connections and people – without impacting on operational continuity and consistency of the technological process. https://ics.kaspersky.com https://ics-cert.kaspersky.com/ https://www.kaspersky.com...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • Ever since the first samples of Android ransomware were discovered, the greater task for us in the Android Security team was to introduce system improvements that would act as a proactive protection against this type of malware, that would minimize the damage a ransomware app can potentially do to device, data and user’s experience. In my talk, I will go through the history of Android ransomware e...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • Once an attacker gets their hands on an embedded, IoT, medical, or industrial control device's firmware, exploitable bugs start screaming for attention thanks to 20th century software development practices; however, bringing current software and security best practices to firmware is only a part of the solution to securing hardware. On the other hand, you might be wrong about the cost and effectiv...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • After years of monitoring and researching attacks against retail traders, investment companies, banks and stock exchanges, I’ve put together multiple stories that shine the spotlight at the extent of financially motivated cybercrime that can have major impact on world economies. A snapshot of what I will discuss includes: • Attackers steal not just money but use malware to hijack an entire oil com...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • TRACKING AN ATTACKER AROUND THE WORLD IN EIGHT YEARS As early as 2009, one particular financial attack group has been successfully stealing payment card data from the entertainment industry, to include casinos, that make the Oceans 11 movie franchise look like child’s play. This talk will walk through the earliest FIN5 compromises identified by Mandiant, showcasing the developmental evolutions of ...

Kaspersky Lab UK
Kaspersky Lab UK
YouTube Video
  • When companies move to the cloud they bring their adversaries with them. Loss of control, loss of visibility, and new threats mean cloud is a bad news story for security right? This talk discusses how attacks change when companies move to the cloud and how successful defenders are adapting. Cloud also brings a number of advantages. Come hear how the diversity of tenants improves security for indiv...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.