Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Renew Licenсe
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB licenсe
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Product Training & Certification
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Company overview
Transparency
Corporate News
Awards & Recognitions
Top 3 Rankings
Press center
Careers
Sponsorships
Policy blog
Contact us
Home
Business
Partners
About us
EN
English
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Threats
Pre-emptive Safety
Threats
Definitions
Threats
Get the latest news and information on the different viruses, malware, and online threats that are affecting online users.
Filter by:
Filter by:
Mac
Malware (threats)
Mobile
Spam
Viruses
Web
How Endpoint Devices Leave Companies Vulnerable
Read More
VIRUSES
Subcategory Viruses
What is a Trojan Horse Virus? Types and How to Remove it
There are many different types of harmful Trojan...
Read More
SPAM
Subcategory Spam
What is Spam and a Phishing Scam - Definition
While very similar, spam and phishing are subtly...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is a DDoS Attack? DDOS Meaning
Learn what DDoS attacks are, how they work, the...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Types of Spyware
Adware, Pornware and Riskware include...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Who Creates Malware?
Malware is created by a wide range of people such...
Read More
VIRUSES
Subcategory Viruses
5 Warning Signs of Advanced Persistent Threat and How to Prevent Advanced Persistent Threats
Advanced Persistent Threat is a long-term attack...
Read More
WEB
Subcategory Web
Top Seven Dangers Children Face Online: How to Keep Them Safe
Protecting children on the Internet is first and...
Read More
VIRUSES
Subcategory Viruses
What is a Computer Virus or a Computer Worm?
A computer virus or a computer worm is a...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is Cybercrime - Definition
Perhaps the most dangerous types of malware...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
The Regin Platform
Regin is a cyber-attack platform capable of...
Read More
VIRUSES
Subcategory Viruses
Evolving Computer Virus & Malware Delivery Methods
In order to commit a wide range of cybercrimes –...
Read More
VIRUSES
Subcategory Viruses
Computer Viruses and Malicious Software
Over the years, malicious software – or malware –...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
The Resource for Internet Threats and Virus Definitions
Click here to discover the latest internet...
Read More
WEB
Subcategory Web
Anatomy of Online Dating Scams - How Not to Become a Victim of Cyber-romance
Romance scams lead to the largest per-person...
Read More
VIRUSES
Subcategory Viruses
A Brief History of Computer Viruses & What the Future Holds
When it comes to cybersecurity, there are few...
Read More
WEB
Subcategory Web
Identity Theft Prevention Tips for Facebook Users
Identity theft protection is a must for all...
Read More
What are Suspicious Packers?
In order to prevent the reverse engineering of a...
Read More
VIRUSES
Subcategory Viruses
Spam Statistics Report Q2-2013
Since February 2013, the percentage of spam in...
Read More
VIRUSES
Subcategory Viruses
What is a Black-Hat hacker?
Black Hat hackers are criminals who break into...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Types of Spyware
Adware, Pornware, and Riskware include...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What is Pornware?
Pornware is the name given to a class of programs...
Read More
Computer Vandalism
In everyday life, there are vandals that seem to...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
What are Malicious Software Tools?
Malicious Tools are malicious software programs...
Read More
1
...
4
Current page, page 5
5
6
...
9