跳到主体内容
2015年5月14日 From setting up spying infrastructure within a country’s borders for real-time connections and data mining, to spying tools with 48 commands, a new report by Kaspersky Lab shows how the threat actor Naikon has spent the last five years successfully...
阅读详情 
2015年5月6日The first quarter of 2015 saw the revelation of the most sophisticated advanced persistent cyberespionage threat to date: Equation.
阅读详情 
2015年4月23日The phenomenon of bullying is nothing new - many adults can recall being bullied in their childhood.
阅读详情 
2015年4月23日Kaspersky Lab’s Global Research and Analysis Team has published a report describing a new, advanced cyberespionage campaign using malware to hit very specific, high-profile entities
阅读详情 
2015年4月15日Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another
阅读详情 
2015年4月14日 In a global operation coordinated by the INTERPOL Global Complex for Innovation in Singapore, a group of leading IT companies including Kaspersky Lab, Microsoft, Trend Micro and Japan’s Cyber Defense Institute, in collaboration with law enforcement...
阅读详情 
2015年4月14日From today, victims of CoinVault ransomware have a chance to retrieve their data without paying the criminals
阅读详情 
2015年3月27日INTERPOL cyber threat researchers, including a Kaspersky Lab expert, have identified a threat to the blockchain in virtual transactions.
阅读详情 
2015年3月26日Kaspersky Lab researcher has examined how a number of fitness wristbands interact with a smartphone and discovered some surprising results.
阅读详情 
2015年3月18日Security concerns among technical professionals are growing as their access to information makes them of increased interest to adversaries in the physical, or analog world.
阅读详情 
2015年3月12日Computer users in many countries are increasingly falling victim to so-called encryption malware – programs that encrypt important data on infected computers and then demand a ransom to decrypt it.
阅读详情 
2015年3月11日 Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the radar of increasingly effective detection systems, Kaspersky Lab experts have...
阅读详情 
2015年3月10日The first malware to successfully outwit the CAPTCHA image recognition system has been detected by Kaspersky Lab’s security analysts.
阅读详情 
2015年3月5日The Kaspersky Lab study ‘Financial Cyberthreats in 2014’ reports that the number of financial malware attacks against Android users grew by 3.25 times in 2014.
阅读详情 
2015年2月17日As the Internet of Things evolves and becomes the Internet of Us, security expert Kaspersky Lab has teamed up with Swedish bio-hacking community BioNyfiken to uncover the realities of connecting our bodies to the Internet
阅读详情 
2015年2月17日Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques
阅读详情 
2015年2月17日Kaspersky Lab, INTERPOL, Europol and authorities from different countries have combined efforts to uncover the criminal plot behind an unprecedented cyberrobbery.
阅读详情 
2015年2月12日The Kaspersky Lab study ‘Financial Cyberthreats in 2014’ reports that 28.8% of phishing attacks in 2014 were intended to steal financial data from users
阅读详情 
2015年2月4日Kaspersky Lab spam analysts have found examples of a mass mailing targeting users in the US
阅读详情 
2015年1月29日 According to Kaspersky Lab the number of untrusted certificates used to sign malicious software doubled in the last year. By the end of 2014 the company’s antivirus database included more than 6,000 of these certificates. Considering the growing...
阅读详情 
2015年1月22日Kaspersky Lab’s experts decided to mark that anniversary by looking further into the future and imagining how information technology might develop and change our lives in the new digital realities of 2045, 30 years from now.
阅读详情 
2014年9月28日 According to a survey conducted by Kaspersky Lab and B2B International in 2014, 53% of companies are willing to invest in software specifically designed to protect financial transactions, using either components installed in their own infrastructure...
阅读详情 
2014年9月24日Industrial and production businesses have security priorities that are drastically different from other businesses, and they value specific types of data far more than any other type of business.
阅读详情