Apr 23 2013
This article is based on technical data from KL experts and their analysis of the Korablin and Morcut malicious programs. A number of conclusions based on open source data.
Dec 18 2012
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu. However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails
Dec 10 2012
This section of the report forms part of the Kaspersky Security Bulletin 2012 and is based on data obtained and processed using Kaspersky Security Network (KSN).
Dec 05 2012
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity
Dec 12 2011
The following statistics were compiled in November using data collected from computers running Kaspersky Lab products
Feb 21 2011
Kaspersky Lab presents its forecast for the IT threat landscape for the period 2011-2020.
Feb 17 2011
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity.
Jun 28 2007
First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions.
Mar 29 2007
This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to protect against them.
Feb 27 2007
This report examines the evolution of malicious programs for mobile devices during the course of 2006.
Jan 18 2007
This latest report examines the development of cybercrime and the relationship between cybercriminals, the IT security industry and other organizations.
Jul 18 2005
Kaspersky Lab presents an overview of malware and cyber threat evolution in the second quarter of 2005.