What we detect
Who creates malware and why?
Have you ever wondered who creates malware? Or why they do it? Find out more about the people behind the threat - the script kiddies, virus writers, and cybercriminals - and what motivates them.
Trojans, viruses, worms, dialers - the programs we detect have lots of different names. Find out how Kaspersky Lab and other antivirus companies classify the many different types of programs which can harm your computer or your data.
History of Malicious Programs
Do you know the name of the first computer virus? Or perhaps you want to find out when the first email worm was created. This section covers the evolution of malicious programs from their initial appearance to the present day.
What if my computer is infected?
With the number of threats rising every day, you may find that your computer has been infected. Find out more about the symptoms of infection, and what steps you should take to clean your computer.
There is currently a lot of buzz about the Backoff point-of-sale Trojan that is designed to steal credit card information from computers that have POS terminals attached. Read Full Article
Trojan-Ransom.Win32.Onion a highly dangerous threat and one of the most technologically advanced encryptors out there. Its developers used both proven techniques ‘tested’ on its predecessors and solutions that are completely new for this class of malware. The use of an unorthodox cryptographic scheme makes file decryption impossible, even if traffic is intercepted between the Trojan and the server. Read Full Article
Over the past decade, APT have intensely targeted organizations and individuals across India. Its developing base of technology, its geographical location and bounds, its inclusive and riotous political energy, and its growing economic weight makes it a special place of interest… Read Full Article
Cybercriminals around the world have already started to point their guns and attacks at the new gTLDs, the ‘generic Top Level Domains’ approved by ICANN and offered by registrars to people interested in buying a new domain name. Recently we… Read Full Article
In February 2014, an article was published on a popular Russian IT website under a curious title – Studying the BillGates Linux Botnet. It described a Trojan with sufficiently versatile DDoS functionality. The capability that we found the most interesting… Read Full Article
Cybercriminals are very actively targeting web sites which are not well-managed, so as to abuse them for their malicious activities. Damage to web sites in Japan has increased since last year, which is alarming to Japanese Internet users. Kaspersky Labs… Read Full Article
Almost a year ago, we wrote our first blog about the mobile Trojan Svpeng. Back then, the first impression was that it was a standard Trojan-SMS class malicious program that stole money from SMS banking accounts. Later we discovered that… Read Full Article
The mobile malware sector is growing rapidly both technologically and structurally. It is safe to say that today’s cybercriminal is no longer a lone hacker but part of a serious business operation. There are various types of actors involved in… Read Full Article
2014 sees two huge sporting events taking place: the football World Cup in Brazil and the Winter Olympic Games in Sochi. In November we mentioned a mailing exploiting the World Cup – the fraudsters disguising their scam as a lottery.… Read Full Article
In response to numerous requests for comments and clarifications after our presentation at theKaspersky Security Analyst Summit 2014, we have created this FAQ with some answers to the most commonly asked questions. 1. Why did you decide to expand this… Read Full Article