THREATS:

  • content/en-global/images/repository/fall-back/14.jpg

    Computer Viruses and Malicious Software

    Over the years, malicious software – or malware – has developed into an extremely serious threat that can place your computer… your precious files, photos, music and financial information… your money… and your children… at risk. However, there are steps you can take to ensure you don’t become a victim of today’s increasingly sophisticated cyberattacks and Internet security threats.

    Read More
  • content/en-global/images/repository/isc/trojan-virus-500-328-thumbnail.jpg

    Top 7 Cyberthreats to Watch Out for in 2015-2016

    These are boom times for cyberthreats, cyberattacks and cybercrime. Here are the seven ongoing threats that showcase today's challenges in keeping your data protected.

    Read More
  • content/en-global/images/repository/fall-back/28.jpg

    Targeted Attacks

    Unlike mass computer virus attacks – that aim to infect as many computers as possible – targeted attacks use a totally different approach. Instead, targeted attacks try to infect the network of a single targeted company or organisation – or apply a specially developed Trojan agent to a single server on the organisation’s network infrastructure.

    Read More
  • content/en-global/images/repository/isc/mobile-malware-475-475-thumbnail.jpg

    Mobile Malware

    Mobile device use is on the rise because smartphones and tablets are quickly becoming more powerful as companies embrace the idea of bring your own device (BYOD) policies and allow users to access corporate networks with personal technology.

    Read More
  • content/en-global/images/repository/fall-back/46.jpg

    Crouching Yeti (Energetic Bear) Malware

    Crouching Yeti is a threat involved in several advanced persistent threat (APT) campaigns that have been active going back to at least the end of 2010.

    Read More
  • content/en-global/images/repository/isc/Kaspersky-Lab-Infographics-Android-Threats-in-2012-thumbnail.jpg

    Android Mobile Security Threats

    With more and more people using their smartphones and tablets to surf the web, update social networking sites and shop & bank online, cybercriminals and malware are increasingly targeting mobile devices – with new smartphone threats and mobile threats.

    Read More
  • content/en-global/images/repository/fall-back/65.jpg

    Inoperable Computers and System Networks

    Computer viruses and Trojan viruses can severely affect the performance of an individual computer or cause the total failure of an entire system network. A wide range of these operability issues can be either intended by the malware creator or completely accidental.

    Read More
  • content/en-global/images/repository/fall-back/37.jpg

    Inoperable Computers and System Networks

    Computer viruses and Trojan viruses can severely affect the performance of an individual computer or cause the total failure of an entire system network. A wide range of these operability issues can be either...

    Read More
  • content/en-global/images/repository/fall-back/51.jpg

    TeslaCrypt Ransomware Attacks

    TeslaCrypt will encrypt files and ask for ransom ($500). Amongst other types of target files, it tries to infect typical gaming files: game saves, user profiles, recoded replays etc.

    Read More
  • content/en-global/images/repository/fall-back/47.jpg

    Darkhotel Malware (APT) Virus Threat

    The latest virus threat attack, called 'Darkhotel', has been analysed by Kaspersky Lab’s Global Research and Analysis Team. The Darkhotel threat appears to be a combination of spear phishing and dangerous malware designed to capture confidential data.

    Read More
Resources not available.