Press Center: Infographics


Products

Corporate products

Consumer products

Technologies

Malware

Business trends




  •  
    Targets of APT Machete

    Targets of APT Machete

    Download -PNG.file, 786 KB

  •  
    Spam & phishing in Q2 2014

    Spam & phishing in Q2 2014

    Download -PNG.file, 545 KB

  •  
    The Epic Turla: Affected Counties

    The Epic Turla: Affected Counties

    Download -PNG.file, 225 KB

  •  
    The Epic Turla Operation

    The Epic Turla Operation

    Download -PNG.file, 285 KB

  •  
    IT Threat Evolution Q2 2014

    IT Threat Evolution Q2 2014

    Download -PNG.file, 707 KB

  •  
    Threats to medium-sized business

    Threats to medium-sized business
    Over a 12-month period these companies experienced…
    Download -PNG.file, 618 kB

  •  
    Multi-device threats in a multi-device world

    Multi-device threats in a multi-device world
    Data stored and threats faced, by device
    Download -PNG.file, 187 kB

  •  
    Mobile malware 10 years ago and now

    Mobile malware 10 years ago and now
    The evolution of mobile malware
    Download -PNG.file, 616 kB

  •  
    Tips for using ATMs and avoiding card cloning

    Tips for using ATMs and avoiding card cloning

    Download -PNG.file, 391 kB

  •  
    Children and the Internet: the Problem of Undesirable Content

    Children and the Internet: the Problem of Undesirable Content

    Download -PNG.file, 285 kB

  •  
    World Cup 2014: phishing

    World Cup 2014: phishing

    Download -JPG.file, 620 kB

  •  
    IT Threat Evolution Q1 2014

    IT Threat Evolution Q1 2014

    Download -PNG.file, 1,47 MB

  •  
    The Mask APT

    The Mask APT

    Download -PNG.file, 3,44 MB

  •  
    Financial malware targets and attacks in 2013

    Cybercriminals target your wallet
    Financial malware targets and attacks in 2013
    Download -PNG.file, 1,54 MB

  •  
    Financial phishing scams are on the rise

    Financial phishing scams are on the rise
    Phishing targets in 2013
    Download -JPEG.file, 3589 KB

  •  
    Online Financial Fraud

    Online Financial Fraud
    How cybercriminals steal money from users’ bank accounts
    Download - JPG file, 1.29 MB.

  •  
    Threats to very small business

    Threats to Very Small Businesses
    How to Select the Right Security Solution?
    Download - JPG file, 1MB.

  •  
    Protecting Your Passwords

    Protecting your passwords
    How can you protect your identity?
    Download - PNG file, 4.8MB.

  •  
    Multi-security for Multi-Devices: Malware for every device

    Multi-security for Multi-Devices
    Malware for every device
    Download - JPG file, 2.53MB.

  •  
    Identity Theft: How to secure your personal data

    Identity Theft
    How to secure your personal data
    Download - PNG file, 3.04MB.

  •  
    The map of financial cyber-threats

    The map of financial cyber-threats
    Steering a safe course through dangerous waters
    Download - PNG file, 1.16MB.

  •  
    The advantages of Whitelisting

    The advantages of Whitelisting
    How to choose the right Whitelisting solution
    Download - JPG file, 1.32MB.

  •  
    The Cost of Cyber-attacks for Business

    The Cost of Cyber-attacks for Business
    How big is the bill facing a company hit by a serious cyber incident?
    Download - PNG file, 2.40MB.

  •  
    Data leakages and their consequences

    Data leaks: the aftermath
    Data leakages and their consequences
    Download - PNG file, 860KB.

  •  
    BYOD and IT security

    BYOD and IT security
    How to get the best from this trend
    Download - PNG file, 2.96MB.

  •  
    Dangers while social networking

    Dangers while social networking
    Social networking is an important part of our lives
    Download - PNG file, 434KB.

  •  
    Red October Victims Map

    Red October Victims Map
    Red October Victims by Country
    Download - PNG file, 915KB.

  •  
    Attack and Defense

    Attack and Defense
    Means to Protect Business Data
    Download - PNG file, 2.19MB.

  •  
    Better IT Security Management

    Better IT Security Management
    Better IT Security Management
    Download - PNG file, 2.25MB.

  •  
    Deeper protection

    Deeper protection
    With Kaspersky Endpoint Security for Business
    Download - PNG file, 2.24MB.

  •  
    Ensuring your corporate IT infrastructure is totally secure

    Ensuring your corporate IT infrastructure is totally secure
    Only a multi-layered defense protects from complex threats
    Download - PNG file, 2.92MB.

  •  
    Managing Mobile Devices

    Managing Mobile Devices
    In a Corporate Environment
    Download - PNG file, 509KB.

  •  
    with Kaspersky Security for Linux Mail Server

    How to fight spam more efficiently
    with Kaspersky Security for Linux Mail Server
    Download - PNG file, 181KB.

  •  
    Protecting what you type with Kaspersky Internet Security

    Protecting what you type with Kaspersky Internet Security
    Why do you need a virtual keyboard
    Download - PNG file, 484KB.

  •  
    Kaspersky Internet Security

    Kaspersky Internet Security
    Reliable protection from all threats
    Download - PNG file, 303KB.

  •  
    Kaspersky PURE Total Security takes the worry out of the web

    Kaspersky PURE Total Security takes the worry out of the web
    Home safe home
    Download - PNG file, 571KB.

  •  
    Protect your lost or stolen Android Tablet

    Protect your lost or stolen Android Tablet
    How to keep your private data safe with protection from Kaspersky Lab
    Download - PNG file, 503KB.

  •  
    Backing up your data with Kaspersky PURE 3.0

    Backing up your data with Kaspersky PURE 3.0
    Total security for your data
    Download - PNG file, 442KB.

  •  
    Application Control

    Application Control
    Security and Productivity
    Download - PNG file, 176KB.

  •  
    Device Control

    Device Control
    Know your hardware
    Download - PNG file, 195KB.

  •  
    Web Control

    Web Control
    Simple and efficient online security policies
    Download - PNG file, 485KB.

  •  
    Data protection

    Data protection
    A priority for business
    Download - PNG file, 2.46MB.

  •  
    Reducing attack surface with Endpoint control

    Reducing attack surface with Endpoint control
    Protect your business from external devices, web threats and unauthorized software
    Download - PNG file, 369KB.

  •  
    Kaspersky Lab and Microsoft in collaboration against cyber-attacks

    Windows 8
    Kaspersky Lab and Microsoft in collaboration against cyber-attacks
    Download - PNG file, 2.64MB.

  •  
    How the Host-based Intrusion Prevention System works

    How the Host-based Intrusion Prevention System works
    Operational principles and benefits of one of the key technologies in security software
    Download - PNG file, 811KB.

  •  
    Safe money

    Safe money
    How Kaspersky Lab protects your bank account
    Download - PNG file, 259KB.

  •  
    Kaspersky Security Network

    Kaspersky Security Network
    What is it and how does it help businesses
    Download - PNG file, 422KB.

  •  
    Application Control with Default Deny

    Application Control with Default Deny
    A new approach to enhanced IT security
    Download - PNG file, 454KB.

  •  
    The User-Centric Approach

    The User-Centric Approach
    Protect all your devices in your home
    Download - PNG file, 229KB.

  •  
    Protecting your kids with Parental Control

    Protecting your kids with Parental Control
    A Safe and Secure online experience for your kids
    Download - PNG file, 1.3MB.

  •  
    Android malware growthin 2012

    Android malware growth in 2012
    More than 3000 new malicious programs every month
    Download - PNG file, 1.44MB.

  •  
    Corporate Security Trends 2011-2012

    Corporate Security Trends 2011-2012
    The changing attitude of businesses towards security
    Download - PNG file, 2.14MB.

  •  
    Vulnerable software

    Vulnerable software
    One of the most dangerous threats to business
    Download - PNG file, 2.09MB.

  •  
    How to prevent your computer from becoming a zombie

    Botnets
    How to prevent your computer from becoming a zombie
    Download - PNG file, 757KB.

  •  
    Business attitudes to IT security in 2012

    Business attitudes to IT security in 2012
    Companies around the world answered questions on their attitude towards various security matters
    Download - PNG file, 838KB.

  •  
    Business attitudes to IT Security 2012-2013

    Business attitudes to IT Security 2012-2013
    Companies around the world answered questions on their attitude towards various security matters
    Download - PNG file, 2.56MB.

  •  
    Your financial data is under threat from cybercriminals

    Your financial data is under threat from cybercriminals
    Save the every step of your online banking transaction
    Download - PNG file, 705KB.

  •  
    Top Threats for Windows PCs in 2012

    Top Threats for Windows PCs in 2012
    Hundreds of thousands of malicious programs emerging every day
    Download - PNG file, 268KB.

  •  
    ZeuS Malware: Double Threat

    ZeuS Malware: Double Threat
    How to defend yourself against ZeuS
    Download - PNG file, 893KB.

  •  
    Android malware growth in 2011

    Android malware growth in 2011
    A threat rising at a meteoritic rate
    Download - PNG file, 450KB.

  •  
    A brief history of cyber weapons

    A brief history of cyber weapons
    From the Cyber wars beginning till recent times
    Download - PNG file, 877KB.

  •  
    Flashback - ZombieMAC

    Flashback - ZombieMAC
    Macs are no longer safe from malware
    Download - PNG file, 278KB.

  •  
    Antivirus math

    Antivirus math
    How much do you cost? How much do you lose?
    Download - PNG file, 1MB.

  •  
    Possible consequences of cyber attacks

    Possible consequences of cyber attacks
    How do direct and indirect cyber damages affect companies and consumers?
    Download - PNG file, 479KB.

  •  
    Mobile mailware evolution

    Mobile malware evolution
    The timeline of malware evolution
    Download -JPEG.file, 1012 KB


© 1997 – 2014 Kaspersky Lab ZAO

All Rights Reserved. Industry-leading Antivirus Software