English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1
Internal threats

Recognizing internal threats

Internal threats now pose a major problem in terms of IT security. In order to protect corporate systems and data, it’s vital to understand what constitutes an internal threat. This section provides a brief introduction.

Recognizing different types of insiders

Insiders are an internal threat as they play a key role in data leaks. Learn more about the types of people who are involved in data leaks and their motivation, and how to mitigate the threat.

Preventing insider activity

It’s essential to keep business-critical data secure. This section provides easy-to-follow recommendations which will help prevent data leaks and protect your business against insider threats.

Analysis

Kaspersky SecurityBulletin 2013. Forecasts

Dec 12 2013

Kaspersky SecurityBulletin 2013. Forecasts

In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage.

Kaspersky Security Bulletin 2013. Overall statistics for 2013

Dec 10 2013

Kaspersky Security Bulletin 2013. Overall statistics for 2013

In 2013 Kaspersky Lab products neutralized 5 188 740 554 cyber-attacks on user computers and mobile devices

Kaspersky Security Bulletin 2013. Corporate threats

Dec 05 2013

Kaspersky Security Bulletin 2013. Corporate threats

The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.

Computing securely: the trusted environment concept

Nov 25 2013

Computing securely: the trusted environment concept

The trusted environment concept combines the advantages of protection provided by Default Deny solutions and the flexibility of antivirus solutions.

Winnti 1.0 technical analysis

Apr 11 2013

Winnti 1.0 technical analysis

The favorite tool of the attackers has been malicious program we called "Winnti". It has evolved since the first use, but we divide all variants into two generations: 1.x and 2.x. Our publication describes 1.0 variant of this tool.

Information Security Threats in the Second Quarter of 2010

Aug 23 2010

Information Security Threats in the Second Quarter of 2010

The majority of the biggest malware incidents that took place in the second quarter of 2010 were linked in some way to botnets. New bots were created and existing bots further developed, such as TDSS, an article on which has been published by our virus analysts, and Zbot (ZeuS), which we discuss...