The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Dec 10 2013

Kaspersky Security Bulletin 2013. Overall statistics for 2013

In 2013 Kaspersky Lab products neutralized 5 188 740 554 cyber-attacks on user computers and mobile devices

Dec 05 2013

Kaspersky Security Bulletin 2013. Corporate threats

The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.

Nov 14 2013

IT Threat Evolution: Q3 2013

According to KSN data, Kaspersky Lab products detected and neutralized a total of 978 628 817  threats in the third quarter of 2013

Oct 30 2013

Kaspersky Lab Report: Java under attack – the evolution of exploits in 2012-2013

No matter how fast developers release updates to patch vulnerabilities, this is still not solving the problem of Java exploit attacks.

Sep 09 2013

Filling a BlackHole

An analysis of the process through which computers are infected using the BlackHole exploit pack and discussion of mechanisms providing protection against Java exploits.

Aug 15 2013

IT Threat Evolution: Q2 2013

According to KSN data, Kaspersky Lab products detected and neutralized a total of 983 051 408 threats in the second quarter of 2013.

Aug 06 2013

The curious case of a CVE-2012-0158 exploit

As the binary is still being analyzed, in this article we will focus only on the delivery part. Even if the exploit is not a zero-day, it's pretty interesting...

May 16 2013

IT Threat Evolution: Q1 2013

According to KSN data, Kaspersky Lab products detected and neutralized 1 345 570 352 threats in Q1 2013.

Feb 01 2013

Kaspersky Lab report: Evaluating the threat level of software vulnerabilities

Vulnerable programs are among the most commonplace ways to attack victims and steal personal data.

Sep 11 2012

The geography of cybercrime: Western Europe and North America

The Internet knows no borders, but according to our data, cybercrime has specific ‘geographical features’.

Aug 16 2011

Heads of the Hydra. Malware for Network Devices

Network devices such as routers, access points and DSL modems are an integral part of today's home and small office networks.

Aug 01 2011

Exploit kits attack vector – mid-year update

It is very interesting to see how short the lifespan of an exploit kit is. Some kits that were once popular and infected thousands of users are no longer being used.