Encyclopedia

All about threats, viruses and spam

Detected Objects

what-we-detect

Malware comes in many colorfully-named varieties. Trojans, viruses, rootkits, bootkits etc, and each carefully-designed with damage in mind! Find out how KL products detect and eliminate them.

Spam and Phishing

spam

Spam's about much more than just unsolicited advertisements. It's a powerful phishing tool that tricks unwary users into divulging personal details. Here's how to avoid it!

Vulnerabilities and Hackers

vulnerabilities

Effective maintenance means reliable computer protection! Hackers exploit software loopholes and cracks to steal your data. By observing these few simple rules you can stay safe.

Internal threats

internal

Thought network security threats only originated externally? You're wrong!The threat from within can be equal or greater! We'll show you how to minimize those risks.