Mar 21 2014
In the past year, many users have been forced to deal with an extremely aggressive multi-component system BitGuard which is difficult to completely remove without professional assistance, although technically it comes with uninstallers.
Dec 03 2013
Кey events that have defined the threat landscape in 2013.
Nov 14 2013
According to KSN data, Kaspersky Lab products detected and neutralized a total of 978 628 817 threats in the third quarter of 2013
Apr 23 2013
This article is based on technical data from KL experts and their analysis of the Korablin and Morcut malicious programs. A number of conclusions based on open source data.
Dec 18 2012
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu. However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails
Dec 10 2012
This section of the report forms part of the Kaspersky Security Bulletin 2012 and is based on data obtained and processed using Kaspersky Security Network (KSN).
Dec 05 2012
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity
Dec 12 2011
The following statistics were compiled in November using data collected from computers running Kaspersky Lab products
Feb 21 2011
Kaspersky Lab presents its forecast for the IT threat landscape for the period 2011-2020.
Feb 17 2011
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity.
Jun 28 2007
First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions.
Mar 29 2007
This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to protect against them.