Skip to main
threats
  • content/en-in/images/repository/isc/mac-virus-protection-threats.png

    Major Threats That Mac Virus Protection Can Prevent

    Mac computers remain at low risk for virus infection, but that doesn't mean Mac users can become complacent. Mac virus protection is still necessary for good computer hygiene and as a part of a comprehensive home-computer security plan.

    Read More >
  • content/en-in/images/repository/isc/2017-images/virus-img-12.jpg

    What’s the Difference between a Virus and a Worm?

    Virus vs Worm: Viruses are dormant until their host file is activated. Worms are malware that self-replicate & propagate independently once in the system.

    Read More >
  • content/en-in/images/repository/isc/2017-images/virus-img-17.jpg

    Evolving Computer Virus & Malware Delivery Methods

    In order to commit a wide range of cybercrimes – including stealing banking details, generating revenues from premium-charge phone numbers or demanding ransom payments – cybercriminals have created and distributed network worms… many of which have caused Internet epidemics.

    Read More >
  • content/en-in/images/repository/isc/2017-images/Ransomware-attacks-2017.jpg

    The biggest ransomware threats of 2017

    These Ransomware attacks made news headlines in 2017 as they spread worldwide, hijacking thousands of computers and crippling businesses. Learn why WannaCry, Petya and Bad Rabbit are on the list of worst ransomware threats in history.
    Read More >
  • content/en-in/images/repository/isc/2017-images/what-is-a-trojan-virus.jpg

    What is a Trojan horse and what damage can it do?

    There are many different types of harmful Trojan horses on the Internet. An overview of the best-known Trojan horses, and how you can protect yourself.
    Read More >
  • content/en-in/images/repository/isc/2018-images/5-warning-signs-of-advanced-persistent-threat.jpg

    5 Warning Signs of Advanced Persistent Threat and How to Prevent Advanced Persistent Threats

    Advanced Persistent Threat is a long-term attack that locates and exploits sensitive information. Learn about 5 warning signs of Advanced Persistent Threat and tips on preventing APT.
    Read More >
  • content/en-in/images/repository/isc/bar-chart-percentage-of-spam-in-email-traffic-Q22013.png

    Spam Statistics Report Q2-2013

    Since February 2013, the percentage of spam in email traffic has seen little to no change. This is the first period in which Kaspersky Lab has observed some stabilization in spam traffic, as there have been many sharp fluctuations in spam numbers over the past few years. Kaspersky Lab expects that the percentage of spam will remain at this level in the future.

    Read More >
  • content/en-in/images/repository/isc/2017-images/What-is-a-black-hat-hacker-710x400.jpg

    What is a Black-Hat hacker?

    Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files or steals passwords.
    Read More >
  • content/en-in/images/repository/isc/cyber-threats-from-hackers_475.png

    Cyber Threats from Foreign Hackers

    In Summer 2015, the University of Virginia computer network was the site of a new hacking attack tied to foreign intelligence operatives. The university has long-standing ties to the Pentagon and U.S. intelligence agencies, making it a natural target for espionage hacks. As a result, UVA shut down its servers for two days, but reported that no student, faculty, or staff personal information (like Social Security numbers) was compromised.

    Read More >
  • content/en-in/images/repository/isc/2017-images/CarHacks.710x400 Updated.jpg

    Car Hacks and How to Protect Yourself

    With the amount of smart technology that automobiles come equipped with these days, the idea of car hacking is not science fiction anymore. Car buyers worry in increasing numbers about the safety of passengers and wonder what they can do to safeguard themselves.
    Read More >
  • 1 /3