<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/en-global/images/repository/isc/Smaller-Icefog-Active-Persistent-Threat-APT-Malware.png

    Kaspersky Unmasks "Icefog" Cyberattacks

    These assaults target specific information, such as passwords and critical files. And once the attackers have what they want, they cover their tracks and slip away into the void. The newly revealed attacks provide a glimpse into a shadowy world in which cybercrime and possible espionage are blurred together in attacks on strategic industries and their global supply chains.

    Read more
  • content/en-global/images/repository/isc/pie-chart-distribution-spam-country-q22013.png

    Types of Malware

    Malware, also known as "malicious software," can be classified several ways in order to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them.

    Read more
  • content/en-global/images/repository/isc/mac-virus-protection-threats.png

    Major Threats That Mac Virus Protection Can Prevent

    Mac computers remain at low risk for virus infection, but that doesn't mean Mac users can become complacent. Mac virus protection is still necessary for good computer hygiene and as a part of a comprehensive home-computer security plan.

    Read more
  • content/en-global/images/repository/isc/information-technology-threats-report-LP.jpg

    Information Technology Security Reports: Figures, Statistics, and Trending Data

    Kaspersky Lab Information Technology (IT) Security Reports provide consumers with in depth information on the latest on information technology security related data, statistics, and trending information. Below are links that contain comprehensive quarterly IT security reports.

    Read more
  • /content/en-global/images/repository/fall-back/32.jpg

    Spam Statistics Report Q3-2013

    This 2013 Quarterly Spam Statistics Report provides the latest analysis of spam trends, malicious attachments, phishing, and insights from the Kaspersky Lab intelligence team for the 3rd quarter 2013. This report provides not only key findings and trends but also spammer methods and tricks as well as spam by source globally.

    Read more
  • content/en-global/images/repository/isc/computer-security-mistakes.png

    Top 10 Ways Hackers Will Exploit Your Mistakes – How to Protect your Computer and Network

    According to the AV-TEST Institute, more than 390,000 new pieces of malware are detected each day. The sheer number of malicious programs gives hackers an ample opportunity to pick and choose their targets. Users often make the same common mistakes that are easily exploited. Here is a rundown of the top 10 mistakes users make and how to avoid them to keep you and your network safe.

    Read more
  • /content/en-global/images/repository/fall-back/31.jpg

    What to Do if Your Identity is Stolen: A Step-By-Step Guide

    In 2014, the Consumer Federation of America performed a survey of consumer agencies that pointed to identity theft as the fastest-growing complaint they've received. Follow this step-by-step guide on what to do if your identity is stolen.

    Read more
  • content/en-global/images/repository/isc/online-dating-scams.jpg

    Anatomy of Online Dating Scams - How Not to Become a Victim of Cyber-romance

    If you thought online dating websites are on the rise, than you would be right. 49 million Americans have tried dating sites, reports Statistic Brain Research Institute. However, not everyone who creates a profile on these sites has honorable intentions. According to the FBI, victims of online dating scams lost more than $82 million in the last six months of 2014. In fact, romance or “confidence” scams lead to the largest per-person losses of any Internet fraud, with the average victim losing more than $100,000. Here’s a quick look at the anatomy of a dating scam, and how you can avoid fake romance.

    Read more
  • content/en-global/images/repository/isc/history-of-computer-viruses-thumbnail.jpg

    No More Shop til you Drop – How Safe is Online Shopping

    Online shopping is convenient, easy and quick. We can shop when we want, compare prices and have our purchases delivered to our front doors. Best of all there are no lines or supermarket parking lots to negotiate online. What’s not to like?

    Read more
  • content/en-global/images/repository/isc/smurf-attack-thumbnail.jpg

    Svchost.exe Virus Sneak Attacks

    The svchost.exe file is commonly used by many Windows applications. However, cybercriminals have been known to attach malware to this file in hopes of catching users off-guard. Thus, it becomes vital to keep an eye out for any "sneak attacks" by cybercriminals and malware creators using the svchost.exe file for Windows.

    Read more
Resources not available.