Solutions for:

  • Home Products
  • Small Business 1-50 employees
  • Medium Business 51-999 employees
  • Enterprise 1000+ employees
Kaspersky
  • CompanyAccount
  • Get In Touch
  • Solutions
      • Endpoint Security

        Learn More

      • Hybrid Cloud Security

        Learn More

      • Internet of Things & Embedded Security

        Learn More

      • Threat Management and Defense

        Learn More

      • Industrial Cybersecurity

        Learn More

      • Fraud Prevention

        Learn More

  • Industries
      • National Cybersecurity

        Learn More

      • Industrial Cybersecurity

        Learn More

      • Finance Services Cybersecurity

        Learn More

      • Healthcare Cybersecurity

        Learn More

      • Transportation Cybersecurity

        Learn More

      • Retail Cybersecurity

        Learn More

      • Other Industries
      • Telecom Cybersecurity
      • View all
  • Products
      • KasperskyEndpoint Security

        Learn More

      • KasperskyEndpoint Detection and Response

        Learn More

      • KasperskyHybrid Cloud Security

        Learn More

      • KasperskyAnti Targeted Attack Platform

        Learn More

      • KasperskyPrivate Security Network

        Learn More

      • KasperskyEmbedded Systems Security

        Learn More

      • Other Products
      • Kaspersky Security for Mail Server
      • Kaspersky DDoS Protection
      • Kaspersky Mobile Security
      • Kaspersky Security for Storage
      • View All
  • Services
      • KasperskyCybersecurity Services

        Learn More

      • KasperskySecurity Awareness

        Learn More

      • KasperskyPremium Support

        Learn More

      • KasperskyThreat Intelligence

        Learn More

      • KasperskyThreat Hunting

        Learn More

      • KasperskyIncident Response

        Learn More

      • Other Services
      • Kaspersky Professional Services
      • Kaspersky Security Assessment
      • Kaspersky Security Training
      • Kaspersky Advanced Cyber Incident Communications
      • View All
  • Resource Center
    • Case Studies
    • White Papers
    • Datasheets
    • Technologies
  • Contact Us
  • GDPR
Menu
Securelist
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Mobile threats
    • Secure environment (IoT)
    • Financial threats
    • Spam and phishing
    • Industrial threats
    • Vulnerabilities and exploits
    • Web threats
  • Categories
    • APT reports
    • Research
    • Incidents
    • Security Bulletin
    • Publications
    • Malware reports
    • Spam and phishing reports
    • All categories
  • Tags
    • Ransomware
    • Targeted Attacks
    • Botnets
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Malware Statistics
    • Show all tags
  • Statistics
  • Encyclopedia
  • Descriptions
  • KSB 2019
  • Solutions for:
  • Home Users
    • Products
      • KasperskyTotal Security
      • KasperskyInternet Security
      • KasperskyAnti-Virus
      • KasperskyInternet Security for Mac
      • Kaspersky Internet Security for Android
      • KasperskySecure Connection
      • Free Tools
      • Kaspersky Safe Kids
      • Kaspersky Password Manager
      • Kaspersky Software Updater
      • View more
    • Renew
    • Downloads
    • Support
    • Resource Center
    • My Kaspersky
      • My Devices
      • My Products / Subscriptions
      • My Orders
  • Small Business(1-50 employees)
    • Products
      • KasperskySmall Office Security
      • KasperskyEndpoint Security Cloud
      • KasperskyEndpoint Security for Business Select
      • KasperskyEndpoint Security for Business Advanced
    • Renew
    • Downloads
    • Support
    • Resource Center
      • Insights
      • Products & Solutions
      • Customer Stories
      • Awards & Recognition
      • Technology
    • GDPR
    • KSOS Portal
  • Medium Business(51-999 employees)
    • Products
      • KasperskyEndpoint Security Cloud
      • KasperskySecurity for Office 365
      • KasperskyEndpoint Security for Business Select
      • KasperskyEndpoint Security for Business Advanced
      • KasperskySecurity for Business Total
      • KasperskyPhysical, Virtual & Cloud Workloads Security
      • TARGETED SECURITY SOLUTIONS
      • Mail Server
      • File Server
      • Mobile
      • Internet Gateway
      • Virtualization and Hybrid Cloud
      • Collaboration
      • Vulnerability and Patch Management
      • Storage
      • View More
    • Services
    • Downloads
    • Support
    • Resource Center
      • Insights
      • Products & Solutions
      • Customer Stories
      • Awards & Recognition
      • Technology
    • GDPR
    • CompanyAccount
  • Enterprise(1000+ employees)
    • Solutions
      • Endpoint Security
      • Hybrid Cloud Security
      • Internet of Things & Embedded Security
      • Threat Management and Defense
      • Industrial Cybersecurity
      • Fraud Prevention
    • Industries
      • National Cybersecurity
      • Industrial Cybersecurity
      • Finance Services Cybersecurity
      • Healthcare Cybersecurity
      • Transportation Cybersecurity
      • Retail Cybersecurity
      • Other industries
      • Telecom Cybersecurity
      • View all
    • Products
      • KasperskyEndpoint Security
      • KasperskyEndpoint Detection and Response
      • KasperskyHybrid Cloud Security
      • KasperskyAnti Targeted Attack Platform
      • KasperskyPrivate Security Network
      • KasperskyEmbedded Systems Security
      • Other products
      • Kaspersky Security for Mail Server
      • Kaspersky DDoS Protection
      • Kaspersky Mobile Security
      • Kaspersky Security for Storage
      • View all
    • Services
      • KasperskyCybersecurity Services
      • KasperskySecurity Awareness
      • KasperskyPremium Support
      • KasperskyThreat Intelligence
      • KasperskyThreat Hunting
      • KasperskyIncident Response
      • Other Services
      • Kaspersky Professional Services
      • Kaspersky Security Assessment
      • Kaspersky Security Training
      • Kaspersky Advanced Cyber Incident Communications
      • View all
    • Resource Center
      • Case Studies
      • White Papers
      • Datasheets
      • Technologies
    • Contact Us
    • GDPR
    • CompanyAccount
  • Securelist
  • Threats
    • Financial threats
    • Mobile threats
    • Web threats
    • Secure environment (IoT)
    • Vulnerabilities and exploits
    • Spam and Phishing
    • Industrial threats
  • Categories
    • APT reports
    • Incidents
    • Research
    • Malware reports
    • Spam and phishing reports
    • Kaspersky Security Bulletin
    • Publications
  • Tags
    • Ransomware
    • Botnets
    • Mobile Malware
    • Social Engineering
    • Targeted Attacks
    • Malware Statistics
    • All Tags
  • Statistics
  • Encyclopedia
  • Descriptions
  • Partners
    • Partners
    • Find a Partner
    • Affiliate
    • Technology
    • Whitelist Program
  • About Us
    • About Us
    • Company
    • Team
    • Transparency
      • Transparency Center
      • Policy Blog
    • Corporate News
    • Press Center
    • Careers
    • Incubator
    • Sponsorships

Securelist Archive / Analysis

author: Elena Bondarenko

Kaspersky Security Bulletin

Kaspersky Security Bulletin. Spam Evolution 2010

February 17, 2011, 11:17 am.
Elena Bondarenko, Darya Gudkova, Maria Namestnikova

Kaspersky Lab analyses approximately 1.5 million spam messages daily. The material for analysis includes email flows of different qualities and intensities provided by our clients and partners, as well as spam that has been captured by special ‘traps’. Read Full Article

Spam and phishing reports

Spam in the Third Quarter of 2010

November 10, 2010, 2:14 pm.
Elena Bondarenko, Darya Gudkova, Maria Namestnikova

The third quarter of 2010 started off with several favorable events for the anti-spam industry. In August, the security intelligence firm, LastLine, worked with a task force to shut down over 20 control centers used by the Pushdo / Cutwail botnet… Read Full Article

Spam and phishing reports

Spam evolution: January-March 2010

May 12, 2010, 5:30 pm.
Elena Bondarenko, Darya Gudkova, Maria Namestnikova

In the first quarter of 2010, the percentage of spam in email traffic averaged 85.2%. This figure coincides with the final result for 2009. Read Full Article

Kaspersky Security Bulletin

Kaspersky Security Bulletin: Spam Evolution 2009

February 17, 2010, 6:25 pm.
Elena Bondarenko, Darya Gudkova, Maria Namestnikova

The percentage of spam in mail traffic in 2009 came to an average of 85.2%, or 3.1% higher than in 2008. The highest percentage of spam recorded was 93% on 22 February, while the low for the year was 72.8% on 26 April. Read Full Article

Spam and phishing reports

Spam evolution: January – June 2009

August 25, 2009, 4:59 pm.
Elena Bondarenko, Darya Gudkova

Spam averaged 85.5% of mail traffic over the first half of 2009. The lowest figure was 72.8% on April 26th, while the highest percentage was 93%, recorded on February 22nd. 0.3% of spam messages included malicious attachments. Read Full Article

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware descriptions
  • Malware reports
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing mailings
  • Spam and phishing reports
  • Webcasts
<
  • 2019

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • Animal Farm
  • ARM
  • Base64
  • Bitscout
  • CAPTCHA
  • Certificate
  • Chronopay
  • DBIR
  • Dell
  • drive-by attack
  • Dropbox
  • FakeCry
  • gam
  • Google glass
  • GSM
  • Microsoft Excel
  • MuddyWater
  • Public transportation
  • RFID
  • sec
  • Simda
  • sinkholing
  • SQL injection
  • SSL
  • TLD
  • Ubuntu
  • USB-token
  • VMWare
  • WAP
  • WireLurker
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertising networks
  • Adware
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • Arabic Malware
  • ARM
  • ASUS
  • AT&T
  • ATM
  • ATM attacks
  • Backdoor
  • BadRabbit
  • Bagle
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitscout
  • Black box
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brazil
  • Browser
  • Browser Plugins
  • BSides
  • Buffer Overflows
  • Cabir
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chinese-speaking cybercrime
  • Chronopay
  • Cloud Computing
  • code injection
  • Comodo
  • Conferences
  • connected car
  • Content Filtering
  • Credentials theft
  • Credit Cards
  • Cross-platform malware
  • Cryptocurrencies
  • Cyber espionage
  • Cyber weapon
  • Cyberbullying
  • Cybercrime
  • Cybercrime Legislation
  • Darknet
  • Data Encryption
  • Data leaks
  • Data Protection
  • Data theft
  • DBIR
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DNS manipulation
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • eBay
  • Electronic Payments
  • Embedded system
  • Emotet
  • Encryption
  • Equation
  • EternalBlue
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • Fake AV
  • FakeCry
  • False Alarms
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Fraud
  • gam
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hacking Team
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • Identity Theft
  • Induc
  • Industrial control systems
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • IOActive
  • Java
  • JavaScript
  • KasperskyOS
  • Kelvir
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • Mastercard
  • MBR
  • Medical threats
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Excel
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft SQL
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money Mule
  • Money theft
  • Mozilla Foundation
  • MuddyWater
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Spam
  • Non-Windows Malware
  • Novell
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Olympic Destroyer
  • Onion
  • Online Games
  • Oracle
  • P2P networks
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • Phishing websites
  • PHP
  • Piracy
  • PlugX
  • POS malware
  • PowerShell
  • Predictions
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Scada
  • Search Engines
  • sec
  • Secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Simda
  • sinkholing
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Sony
  • Spam and the law
  • Spam Letters
  • Spam Statistics
  • Spammer techniques
  • Spear Phishing
  • spoofing
  • SpyEye
  • Spyware
  • SQL injection
  • SSL
  • Stalkerware
  • steganography
  • Stuxnet
  • SunOS / Solaris
  • supply-chain attack
  • Syria
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Thematic phishing
  • Thematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • TOR
  • Torrent
  • Trainings
  • Trojan
  • Trojan Banker
  • Trojan Clicker
  • Trojan-Dropper
  • Trojan-Spy
  • Trojan-stealer
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • VISA
  • VMWare
  • VPN
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • Zebrocy
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Aime, Félix
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Andreeva, Oxana
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Badovskaya, Ekaterina
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bogdanov, Vyacheslav
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Cheremushkin, Pavel
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demeter, Dan
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedorova, Mariya
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Fisher, Dennis
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovin, Igor
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Gutnikov, Alexander
  • Herkanaidu, Ram
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton V.
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Jordan, David
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky, kaspersky
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Kholopova, Vera
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kopeytsev, Vyacheslav
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Anton
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Mareichev, Petr
  • Markov, Konstantin
  • Marques, Thiago
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Nikolenko, Lyubov
  • Novikova, Yuliya
  • Novikov, Sergey
  • Okhotin, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Ovchinnikov, Artemy
  • Pakulov, Artur
  • Parinov, Denis
  • Parys, Bart
  • Pikman, Lev
  • Pintiysky, Vladislav
  • Plakhov, Alexander
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Potseluevskaya, Evgeniya
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Seow, Alan
  • Shaaban, Ayman
  • Shabab, Noushin
  • Shadrin, Alexander
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shishkova, Tatyana
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sidorina, Tatyana
  • Sinitsyn, Fedor
  • Sitchikhin, Denis
  • Slepogin, Nikita
  • Soldatov, Sergey
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Sytnik, Mikhail
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Temnikov, Sergey
  • Tenreiro, André
  • Unuchek, Roman
  • Vasilenko, Egor
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Anna
  • Vlasova, Victoria
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Alexander
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Pavel
  • Zelensky, Sergey
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2019 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email