The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Jun 29 2011

Keyloggers: Implementing keyloggers in Windows. Part Two

This article is a continuation of the previous report on keyloggers. It offers a detailed analysis of the technical aspects and inner workings of keyloggers.

Sep 30 2010

The antivirus weather forecast: cloudy

These days, when you scan Internet resources or take part in discussions, you inevitably come across materials and comments related to the use of cloud technology in antivirus protection.

Apr 24 2009

Clear skies ahead: cloud computing and in-the-cloud security

Every era has its buzzwords and the IT sector is no different: "multimedia" in the 80s, "interactive" in the 90s, and ”web 2.0” in the last few years. And just when everyone’s starting to get comfortable with the most recent piece of terminology, along comes another one.

Dec 21 2007

Coordinated distributions method for tracking botnets sending out spam

This paper presents a method to automatically separate and block those networks in real time. The method uses a statistical approach exploiting the fact that computers in a botnet have to have some similarities in their behavior.

Dec 20 2007

Using leak tests to evaluate firewall effectiveness

A firewall provides security which is additional to that provided by other security solutions and appliances. Additional security is becoming increasingly relevant due to the increase in the number of new malicious programs.

Nov 07 2007

The evolution of technologies used to detect malicious code

This article provides an overview of methods used to detect malicious code; of the functional (and to some extent chronological) connections between these methods; and of their technological and applied features

Jul 20 2007

Modern Security Suite solutions: methods for protecting confidential data

The article compares two different methods for protecting confidential data - the traditional one, and an alternative approach based on analyzing application activity.

Mar 29 2007

Keyloggers: How they work and how to detect them (Part 1)

This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to protect against them.

Mar 16 2007

Secure connections: how secure are they?

The fact that it’s easy to encrypt a network channel and the fact that in most cases there will be no verification of who created the file results in a contradictory situation: a “secure connection” to a server provides the user with a feeling of security, but does not guarantee that the connection will be free from malicious data.

Jan 24 2007

Vista vs. Viruses

Microsoft’s latest development, Windows Vista, is positioned as a system with enhanced security. The official release data is scheduled for 30th January 2007. However, questions as to how realistic the claims of enhanced security are were being raised by the computing community long before a...

Jan 18 2007

The Virtual Conflict - Who Will Triumph?

This latest report examines the development of cybercrime and the relationship between cybercriminals, the IT security industry and other organizations.

Jun 28 2006

Proactive Protection: a Panacea for Viruses?

The first in a series of articles that discuss the newest technologies used by antivirus companies which focuses on proactive technologies