Many of today’s threats exploit software vulnerabilities in order to spread. Learn more about what vulnerabilities are, what the most common vulnerabilities are, and how to fix them.
Hackers may try and access your computer to get access to your data or to use your computing resources for illegal activity. This section provides information on the signs and symptoms of a hacker attack.
Computer systems have always been targeted by people seeking either to improve security or exploit loopholes. This timeline gives an overview of major events in the evolution of computing along with the evolution of hacking.
Government and law enforcement bodies around the world address the problem of cybercrime with legislation. Find out more about how these laws are used to convict hackers who gain illegal access to systems and data.
Apr 17 2014
According to KSN data, Kaspersky Lab products blocked a total of 1131000866 malicious attacks on computers and mobile devices in the first quarter of 2014.
Feb 12 2014
The curent report is a return to the problem of security mechanisms implemented in modern anti-theft technologies that reside in firmware and PC BIOS of commonly used laptops and some of desktops.
Dec 12 2013
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage.
Dec 10 2013
In 2013 Kaspersky Lab products neutralized 5 188 740 554 cyber-attacks on user computers and mobile devices
Dec 05 2013
The extensive use of computers and other digital devices in all areas of business has created ideal conditions for cyber espionage programs and malware capable of stealing corporate data.
13 Apr, 11:18 GMT
08 Apr, 20:38 GMT
08 Apr, 17:58 GMT
08 Apr, 08:50 GMT
31 Mar, 09:03 GMT
10 Mar, 14:40 GMT
05 Mar, 11:00 GMT