Dec 05 2013
The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.
Jul 11 2011
The Internet provides children with wonderful social and developmental opportunities, but the Internet can also be fraught with nasty surprises — if parents don’t keep a watchful eye.
Sep 08 2010
How does a computer get infected if you’re just surfing the Internet? And how do cybercriminals make money from tricking users? This article aims to answer these questions.
Apr 19 2010
Social Networking is the one area of the Internet that nearly every computer-literate person indulges in these days. It doesn’t matter whether it’s your company boss, your neighbor, your boyfriend or your girlfriend, everybody’s contactable via at least one of the Social Networking portals.
Mar 03 2010
Today’s threat landscape is very complex. Cybercriminals use a wide range of threats to hijack people’s computers and to make money illegally. These threats include Trojans of many different kinds, worms, viruses and exploit code which is designed to enable malware to make use of vulnerabilities in the operating system or applications.
Sep 24 2009
We all learn at a very young age to analyse – either consciously or unconsciously – other people's body language and intonation
Dec 20 2005
Two Kaspersky Lab virus analysts share their thoughts on the role people play in ensuring information security.
Oct 21 2005
This latest report continues Kaspersky Lab's sequence of quarterly reports on malware and cyber threat evolution.
Apr 18 2005
Kaspersky Lab presents an overview of malware evolution in the first quarter of 2005.