Skip to main
threats
mac
malware (threats)
mobile
spam
viruses
web
  • content/en-global/images/repository/isc/2017-images/virus-img-17.jpg

    Evolving Computer Virus & Malware Delivery Methods

    In order to commit a wide range of cybercrimes – including stealing banking details, generating revenues from premium-charge phone numbers or demanding ransom payments – cybercriminals have created and distributed network worms… many of which have caused Internet epidemics.

    Read More >
  • content/en-global/images/repository/isc/2017-images/virus-img-13.jpg

    Dealing with Svchost.exe Virus' Sneak Attack

    Svchost.exe actually stands for "service host," and it is a file used by many Windows applications. Despite this, it often is mistaken as a virus because malware authors have been known to attach malicious files to the svchost.exe service to prevent detection.

    Read More >
  • content/en-global/images/repository/isc/2017-images/virus-img-18.jpg

    Computer Viruses and Malicious Software

    Over the years, malicious software – or malware – has developed into an extremely serious threat that can place your computer… your precious files, photos, music and financial information… your money… and your children… at risk. However, there are steps you can take to ensure you don’t become a victim of today’s increasingly sophisticated cyberattacks and Internet security threats.

    Read More >
  • content/en-global/images/repository/isc/2017-images/virus-img-12.jpg

    What’s the Difference between a Virus and a Worm?

    Virus vs Worm: Viruses are dormant until their host file is activated. Worms are malware that self-replicate & propagate independently once in the system.

    Read More >
  • content/en-global/images/repository/isc/2017-images/Ransomware-attacks-2017.jpg

    The biggest ransomware threats

    These Ransomware attacks made news headlines as they spread worldwide, hijacking thousands of computers and crippling businesses. Learn why WannaCry, Petya and Bad Rabbit are on the list of worst ransomware threats in history.
    Read More >
  • content/en-global/images/repository/isc/2017-images/what-is-a-trojan-virus.jpg

    What is a Trojan horse and what damage can it do?

    There are many different types of harmful Trojan horses on the Internet. An overview of the best-known Trojan horses, and how you can protect yourself.
    Read More >
  • content/en-global/images/repository/isc/2018-images/5-warning-signs-of-advanced-persistent-threat.jpg

    5 Warning Signs of Advanced Persistent Threat and How to Prevent Advanced Persistent Threats

    Advanced Persistent Threat is a long-term attack that locates and exploits sensitive information. Learn about 5 warning signs of Advanced Persistent Threat and tips on preventing APT.
    Read More >
  • content/en-global/images/repository/isc/2017-images/virus-img-19.jpg

    What is a Computer Virus or a Computer Worm?

    A computer virus or a computer worm is a malicious software program that can self-replicate on computers or via computer networks – without you being aware that your machine has become infected...

    Read More >
  • content/en-global/images/repository/isc/2017-images/virus-img-10.jpg

    A Brief History of Computer Viruses & What the Future Holds

    When it comes to cybersecurity, there are few terms with more name recognition than "computer viruses." Despite the prevalence of these threats and their wide-spread impact, however, many users don't know about the basic nature of viruses. 

    Read More >
  • content/en-global/images/repository/isc/bar-chart-percentage-of-spam-in-email-traffic-Q22013.png

    Spam Statistics Report Q2-2013

    Since February 2013, the percentage of spam in email traffic has seen little to no change. This is the first period in which Kaspersky Lab has observed some stabilization in spam traffic, as there have been many sharp fluctuations in spam numbers over the past few years. Kaspersky Lab expects that the percentage of spam will remain at this level in the future.

    Read More >
  • 1 /3
  • 1
  • 2
  • 3