<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/en-global/images/repository/isc/Smaller-Icefog-Active-Persistent-Threat-APT-Malware.png

    Kaspersky Unmasks "Icefog" Cyberattacks

    These assaults target specific information, such as passwords and critical files. And once the attackers have what they want, they cover their tracks and slip away into the void. The newly revealed attacks provide a glimpse into a shadowy world in which cybercrime and possible espionage are blurred together in attacks on strategic industries and their global supply chains.

    Read more
  • content/en-global/images/repository/isc/pie-chart-distribution-spam-country-q22013.png

    Types of Malware

    Malware, also known as "malicious software," can be classified several ways in order to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them.

    Read more
  • content/en-global/images/repository/isc/2017-images/virus-img-19.jpg

    What is a Computer Virus or a Computer Worm?

    A computer virus or a computer worm is a malicious software program that can self-replicate on computers or via computer networks – without you being aware that your machine has become infected...

    Read more
  • content/en-global/images/repository/isc/mac-virus-protection-threats.png

    Major Threats That Mac Virus Protection Can Prevent

    Mac computers remain at low risk for virus infection, but that doesn't mean Mac users can become complacent. Mac virus protection is still necessary for good computer hygiene and as a part of a comprehensive home-computer security plan.

    Read more
  • content/en-global/images/repository/isc/information-technology-threats-report-LP.jpg

    Information Technology Security Reports: Figures, Statistics, and Trending Data

    Kaspersky Lab Information Technology (IT) Security Reports provide consumers with in depth information on the latest on information technology security related data, statistics, and trending information. Below are links that contain comprehensive quarterly IT security reports.

    Read more
  • /content/en-global/images/repository/fall-back/44.jpg

    Spam Statistics Report Q3-2013

    This 2013 Quarterly Spam Statistics Report provides the latest analysis of spam trends, malicious attachments, phishing, and insights from the Kaspersky Lab intelligence team for the 3rd quarter 2013. This report provides not only key findings and trends but also spammer methods and tricks as well as spam by source globally.

    Read more
  • content/en-global/images/repository/isc/2017-images/malware-img-22.jpg

    The Duqu 2.0 Targeted Attacks

    Duqu 2.0 is a highly sophisticated malware platform exploiting up to three zero-day vulnerabilities with infections linked to the P5+1 events and venues for high level meetings between world leaders.

    Read more
  • content/en-global/images/repository/isc/computer-security-mistakes.png

    Top 10 Ways Hackers Will Exploit Your Mistakes – How to Protect your Computer and Network

    According to the AV-TEST Institute, more than 390,000 new pieces of malware are detected each day. The sheer number of malicious programs gives hackers an ample opportunity to pick and choose their targets. Users often make the same common mistakes that are easily exploited. Here is a rundown of the top 10 mistakes users make and how to avoid them to keep you and your network safe.

    Read more
  • /content/en-global/images/repository/fall-back/31.jpg

    What to Do if Your Identity is Stolen: A Step-By-Step Guide

    In 2014, the Consumer Federation of America performed a survey of consumer agencies that pointed to identity theft as the fastest-growing complaint they've received. Follow this step-by-step guide on what to do if your identity is stolen.

    Read more
  • content/en-global/images/repository/isc/2017-images/malware-img-10.jpg

    BlackEnergy APT Attacks in Ukraine

    BlackEnergy is a Trojan that is used to conduct DDoS attacks, cyber espionage and information destruction attacks.

    Read more
Resources not available.