A Malware Classification
At Kaspersky, we take our responsibility to keep you guarded against attacks very seriously, which is why we’re continuously familiarizing you with the latest methods that are out there and
760 articles
At Kaspersky, we take our responsibility to keep you guarded against attacks very seriously, which is why we’re continuously familiarizing you with the latest methods that are out there and
Most of us can no longer imagine a world in which we aren’t digitally connected at all times, and cybercriminals are well aware of this. With the growing importance of
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia. We have
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
No one likes malware. In fact, pretty much everyone hates it. But it’s not the worst problem facing the world right now either. The problems in the online world pale
Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
It’s a common belief that Macs are safer than PCs because most computer viruses are designed to attack Windows machines and not Macs. Recent high-profile Mac-targeted viruses like MacDefender and
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have