Many of today’s threats exploit software vulnerabilities in order to spread. Learn more about what vulnerabilities are, what the most common vulnerabilities are, and how to fix them.
Hackers may try and access your computer to get access to your data or to use your computing resources for illegal activity. This section provides information on the signs and symptoms of a hacker attack.
Computer systems have always been targeted by people seeking either to improve security or exploit loopholes. This timeline gives an overview of major events in the evolution of computing along with the evolution of hacking.
Government and law enforcement bodies around the world address the problem of cybercrime with legislation. Find out more about how these laws are used to convict hackers who gain illegal access to systems and data.
Feb 12 2014
The curent report is a return to the problem of security mechanisms implemented in modern anti-theft technologies that reside in firmware and PC BIOS of commonly used laptops and some of desktops.
Dec 12 2013
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage.
Dec 10 2013
In 2013 Kaspersky Lab products neutralized 5 188 740 554 cyber-attacks on user computers and mobile devices
Dec 05 2013
The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.
Dec 03 2013
Кey events that have defined the threat landscape in 2013.
Nov 26 2013
Neverquest supports just about every possible trick on online bank attacks. In light of Neverquest’s self-replication capabilities, the number of users attacked could increase over a short period of time.
10 Mar, 14:40 GMT
05 Mar, 11:00 GMT
03 Mar, 08:37 GMT
28 Feb, 13:00 GMT
13 Feb, 19:32 GMT
10 Feb, 18:46 GMT
05 Feb, 15:15 GMT