Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew Licenсe
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB licenсe
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Product Training & Certification
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Kaspersky United Partner Portal
Become a B2B partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Company overview
Transparency
Corporate News
Awards & Recognitions
Top 3 Rankings
Press center
Careers
Sponsorships
Policy blog
Contact us
Home
Business
Partners
About us
EN
English
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (عربى)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский
Қазақстан - Қазақша
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Threats
Pre-emptive Safety
Threats
Definitions
Threats
Get the latest news and information on the different viruses, malware, and online threats that are affecting online users.
Filter by:
Filter by:
Mac
Malware (threats)
Mobile
Spam
Viruses
Web
MOBILE
Subcategory Mobile
Sharenting: What parents should consider before posting their children’s photos online
Sharenting is a result of the rise of social...
Read More
MOBILE
Subcategory Mobile
Security and drones — what you need to know
No one knows quite how many drones there are....
Read More
MOBILE
Subcategory Mobile
COVID-19: How to stay safe from hackers and avoid Coronavirus scams
The COVID-19 pandemic has given rise to a new...
Read More
MOBILE
Subcategory Mobile
Cyber Security Risks: Best Practices for Working from Home and Remotely
Best practices for working from home and...
Read More
MOBILE
Subcategory Mobile
How to speed up your laptop or PC
If you have a laptop that seems to take half an...
Read More
MOBILE
Subcategory Mobile
How to speed up an Android phone
There's nothing as frustrating as an Android...
Read More
MOBILE
Subcategory Mobile
How safe are smart homes?
You get home; the lights are on, your dinner is...
Read More
MOBILE
Subcategory Mobile
Deepfake and Fake Videos - How to Protect Yourself?
Hackers have long since progressed beyond...
Read More
MOBILE
Subcategory Mobile
Mobile Security: Android vs iOS — which one is safer?
Which is safer - iOS or Android? The truth: all...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is Riskware?
Read More
MOBILE
Subcategory Mobile
How to remove a hacker from your smartphone
Should you worry about phone hacking? Learn how...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
DarkHotel APT: What It Is and How It Works
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is Adware? – Definition and Explanation
What is adware? How do you remove adware? Learn...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is WannaCry ransomware?
What happened to the WannaCry hacker? We discuss...
Read More
MOBILE
Subcategory Mobile
Smartwatch Security - Safety & Risks
Can smartwatches be hacked? Is your smartwatch...
Read More
MOBILE
Subcategory Mobile
Tips for Generating Strong and Unique Passwords
How strong are your passwords? They may not be as...
Read More
MOBILE
Subcategory Mobile
How to Protect Yourself Against Mobile Scams
How can you avoid mobile phone scams? Learn how...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Koler 'police' mobile ransomware
In this section, you will discover the most...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Top Ten Most Notorious (Infamous) Hackers of All Time
Hacking costs companies and consumers many...
Read More
VIRUSES
Subcategory Viruses
Dealing with Svchost.exe Virus' Sneak Attack
Svchost.exe actually stands for "service host,"...
Read More
WEB
Subcategory Web
Online dating scams and how to avoid them
Romance scams are on the rise. Learn the signs of...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Top 10 Ways Hackers Will Exploit Your Mistakes – How to Protect your Computer and Network
According to the AV-TEST Institute, more than...
Read More
Malware & Computer Virus Facts & FAQs
Computer viruses & other types of malware are a...
Read More
MOBILE
Subcategory Mobile
What is a honeypot?
You may have heard the term 'honeypot' being used...
Read More
Current page, page 1
1
2
3
4
...
9