Many of today’s threats exploit software vulnerabilities in order to spread. Learn more about what vulnerabilities are, what the most common vulnerabilities are, and how to fix them.
Hackers may try and access your computer to get access to your data or to use your computing resources for illegal activity. This section provides information on the signs and symptoms of a hacker attack.
Computer systems have always been targeted by people seeking either to improve security or exploit loopholes. This timeline gives an overview of major events in the evolution of computing along with the evolution of hacking.
Government and law enforcement bodies around the world address the problem of cybercrime with legislation. Find out more about how these laws are used to convict hackers who gain illegal access to systems and data.
May 16 2013
According to KSN data, Kaspersky Lab products detected and neutralized 1 345 570 352 threats in Q1 2013.
Feb 01 2013
Vulnerable programs are among the most commonplace ways to attack victims and steal personal data.
Dec 13 2012
It is clear that any attempt to predict the IT security landscape in 2030 will have to be a forecast of security and society in general. IT is now almost everywhere, and its scope will only increase in the future.
Dec 05 2012
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity
Sep 11 2012
The Internet knows no borders, but according to our data, cybercrime has specific ‘geographical features’.
04 Jun, 14:01 GMT
03 Jun, 09:14 GMT
18 May, 12:00 GMT
14 May, 18:06 GMT
25 Apr, 15:44 GMT
19 Apr, 10:24 GMT
12 Apr, 17:51 GMT