Many of today’s threats exploit software vulnerabilities in order to spread. Learn more about what vulnerabilities are, what the most common vulnerabilities are, and how to fix them.
Hackers may try and access your computer to get access to your data or to use your computing resources for illegal activity. This section provides information on the signs and symptoms of a hacker attack.
Computer systems have always been targeted by people seeking either to improve security or exploit loopholes. This timeline gives an overview of major events in the evolution of computing along with the evolution of hacking.
Government and law enforcement bodies around the world address the problem of cybercrime with legislation. Find out more about how these laws are used to convict hackers who gain illegal access to systems and data.
Dec 05 2013
The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.
Dec 03 2013
Кey events that have defined the threat landscape in 2013.
Nov 26 2013
Neverquest supports just about every possible trick on online bank attacks. In light of Neverquest’s self-replication capabilities, the number of users attacked could increase over a short period of time.
Nov 14 2013
According to KSN data, Kaspersky Lab products detected and neutralized a total of 978 628 817 threats in the third quarter of 2013
Oct 30 2013
No matter how fast developers release updates to patch vulnerabilities, this is still not solving the problem of Java exploit attacks.
05 Dec, 09:38 GMT
03 Dec, 11:03 GMT
15 Nov, 11:09 GMT
15 Nov, 10:00 GMT
14 Nov, 16:55 GMT
12 Nov, 20:32 GMT
12 Nov, 19:01 GMT