Solutions for:

  • Home Products
  • Small Business 1-50 employees
  • Medium Business 51-999 employees
  • Enterprise 1000+ employees
Kaspersky
  • CompanyAccount
  • Get In Touch
  • Solutions
      • Endpoint Security

        Learn More

      • Hybrid Cloud Security

        Learn More

      • Internet of Things & Embedded Security

        Learn More

      • Threat Management and Defense

        Learn More

      • Industrial Cybersecurity

        Learn More

      • Fraud Prevention

        Learn More

  • Industries
      • National Cybersecurity

        Learn More

      • Industrial Cybersecurity

        Learn More

      • Finance Services Cybersecurity

        Learn More

      • Healthcare Cybersecurity

        Learn More

      • Transportation Cybersecurity

        Learn More

      • Retail Cybersecurity

        Learn More

      • Other Industries
      • Telecom Cybersecurity
      • View all
  • Products
      • KasperskyEndpoint Security

        Learn More

      • KasperskyEndpoint Detection and Response

        Learn More

      • KasperskyHybrid Cloud Security

        Learn More

      • KasperskyAnti Targeted Attack Platform

        Learn More

      • KasperskyPrivate Security Network

        Learn More

      • KasperskyEmbedded Systems Security

        Learn More

      • Other Products
      • Kaspersky Security for Mail Server
      • Kaspersky DDoS Protection
      • Kaspersky Mobile Security
      • Kaspersky Security for Storage
      • View All
  • Services
      • KasperskyCybersecurity Services

        Learn More

      • KasperskySecurity Awareness

        Learn More

      • KasperskyPremium Support

        Learn More

      • KasperskyThreat Intelligence

        Learn More

      • KasperskyThreat Hunting

        Learn More

      • KasperskyIncident Response

        Learn More

      • Other Services
      • Kaspersky Professional Services
      • Kaspersky Security Assessment
      • Kaspersky Security Training
      • Kaspersky Advanced Cyber Incident Communications
      • View All
  • Resource Center
    • Case Studies
    • White Papers
    • Datasheets
    • Technologies
  • Contact Us
  • GDPR
Menu
Securelist
English
  • English
  • Pусский
  • Deutsch
  • Français
  • Italiano
  • Español
  • Polski
  • Threats
    • Mobile threats
    • Secure environment (IoT)
    • Financial threats
    • Spam and phishing
    • Industrial threats
    • Vulnerabilities and exploits
    • Web threats
  • Categories
    • APT reports
    • Research
    • Incidents
    • Security Bulletin
    • Publications
    • Malware reports
    • Spam and phishing reports
    • All categories
  • Tags
    • Ransomware
    • Targeted Attacks
    • Botnets
    • Internet Banking
    • Mobile Malware
    • Social Engineering
    • Malware Statistics
    • Show all tags
  • Statistics
  • Encyclopedia
  • Descriptions
  • KSB 2019
  • Solutions for:
  • Home Users
    • Products
      • KasperskyTotal Security
      • KasperskyInternet Security
      • KasperskyAnti-Virus
      • KasperskyInternet Security for Mac
      • Kaspersky Internet Security for Android
      • KasperskySecure Connection
      • Free Tools
      • Kaspersky Safe Kids
      • Kaspersky Password Manager
      • Kaspersky Software Updater
      • View more
    • Renew
    • Downloads
    • Support
    • Resource Center
    • My Kaspersky
      • My Devices
      • My Products / Subscriptions
      • My Orders
  • Small Business(1-50 employees)
    • Products
      • KasperskySmall Office Security
      • KasperskyEndpoint Security Cloud
      • KasperskyEndpoint Security for Business Select
      • KasperskyEndpoint Security for Business Advanced
    • Renew
    • Downloads
    • Support
    • Resource Center
      • Insights
      • Products & Solutions
      • Customer Stories
      • Awards & Recognition
      • Technology
    • GDPR
    • KSOS Portal
  • Medium Business(51-999 employees)
    • Products
      • KasperskyEndpoint Security Cloud
      • KasperskySecurity for Office 365
      • KasperskyEndpoint Security for Business Select
      • KasperskyEndpoint Security for Business Advanced
      • KasperskySecurity for Business Total
      • KasperskyPhysical, Virtual & Cloud Workloads Security
      • TARGETED SECURITY SOLUTIONS
      • Mail Server
      • File Server
      • Mobile
      • Internet Gateway
      • Virtualization and Hybrid Cloud
      • Collaboration
      • Vulnerability and Patch Management
      • Storage
      • View More
    • Services
    • Downloads
    • Support
    • Resource Center
      • Insights
      • Products & Solutions
      • Customer Stories
      • Awards & Recognition
      • Technology
    • GDPR
    • CompanyAccount
  • Enterprise(1000+ employees)
    • Solutions
      • Endpoint Security
      • Hybrid Cloud Security
      • Internet of Things & Embedded Security
      • Threat Management and Defense
      • Industrial Cybersecurity
      • Fraud Prevention
    • Industries
      • National Cybersecurity
      • Industrial Cybersecurity
      • Finance Services Cybersecurity
      • Healthcare Cybersecurity
      • Transportation Cybersecurity
      • Retail Cybersecurity
      • Other industries
      • Telecom Cybersecurity
      • View all
    • Products
      • KasperskyEndpoint Security
      • KasperskyEndpoint Detection and Response
      • KasperskyHybrid Cloud Security
      • KasperskyAnti Targeted Attack Platform
      • KasperskyPrivate Security Network
      • KasperskyEmbedded Systems Security
      • Other products
      • Kaspersky Security for Mail Server
      • Kaspersky DDoS Protection
      • Kaspersky Mobile Security
      • Kaspersky Security for Storage
      • View all
    • Services
      • KasperskyCybersecurity Services
      • KasperskySecurity Awareness
      • KasperskyPremium Support
      • KasperskyThreat Intelligence
      • KasperskyThreat Hunting
      • KasperskyIncident Response
      • Other Services
      • Kaspersky Professional Services
      • Kaspersky Security Assessment
      • Kaspersky Security Training
      • Kaspersky Advanced Cyber Incident Communications
      • View all
    • Resource Center
      • Case Studies
      • White Papers
      • Datasheets
      • Technologies
    • Contact Us
    • GDPR
    • CompanyAccount
  • Securelist
  • Threats
    • Financial threats
    • Mobile threats
    • Web threats
    • Secure environment (IoT)
    • Vulnerabilities and exploits
    • Spam and Phishing
    • Industrial threats
  • Categories
    • APT reports
    • Incidents
    • Research
    • Malware reports
    • Spam and phishing reports
    • Kaspersky Security Bulletin
    • Publications
  • Tags
    • Ransomware
    • Botnets
    • Mobile Malware
    • Social Engineering
    • Targeted Attacks
    • Malware Statistics
    • All Tags
  • Statistics
  • Encyclopedia
  • Descriptions
  • Partners
    • Partners
    • Find a Partner
    • Affiliate
    • Technology
    • Whitelist Program
  • About Us
    • About Us
    • Company
    • Team
    • Transparency
      • Transparency Center
      • Policy Blog
    • Corporate News
    • Press Center
    • Careers
    • Incubator
    • Sponsorships

Securelist Archive / Analysis

Date: November 2009

Events

IT Security for the Next Generation

November 27, 2009, 8:11 pm.
Sergey Novikov

IT Security for the Next Generation Read Full Article

Malware descriptions

Porn dialers for smartphones, part 2

November 26, 2009, 7:46 pm.
Denis Maslennikov

Today we added detection for a new variant of the program – not-a-virus.Porn-Dialer.SymbOS.Pornidal.c. Just like its predecessor, this application can be harmful for two reasons. Read Full Article

Spam and phishing mailings

Free turkey for all!

November 26, 2009, 5:17 pm.
Maria Namestnikova

Free turkey for all! Read Full Article

Spam and phishing reports

Spam evolution: July-September 2009

November 23, 2009, 3:53 pm.
Darya Gudkova

In the third quarter of 2009, the percentage of spam in mail traffic averaged 85.7% Read Full Article

Spam and phishing mailings

Tomorrow’s spam – today

November 19, 2009, 1:04 pm.
Maria Namestnikova

Tomorrow’s spam – today Read Full Article

Opinion

The link between high speed and cybercrime

November 18, 2009, 1:03 pm.
Costin Raiu

The link between high speed and cybercrime Read Full Article

Events

Facebook isn’t always fun

November 16, 2009, 8:38 pm.
David Emm

National Anti-Bullying Week is kicking off in the UK today. This year the focus is on combating cyberbullying, with lots of resources for schools, a roadshow, and videos discussing the problem of bullying. Read Full Article

Publications

Rogue antivirus: a growing problem

November 13, 2009, 5:40 pm.
Vyacheslav Zakorzhevsky

During the past two years we’ve written many times about programs which pretend to be something that they are not Read Full Article

Opinion

Happy Friday 13th!

November 13, 2009, 4:57 pm.
Alexander Gostev

Happy Friday 13th! Read Full Article

Publications

Browsing malicious websites

November 12, 2009, 11:45 am.
Costin Raiu

Over the past few years, the Internet has become a dangerous place Read Full Article

Older posts

  • Categories
  • Date
  • Tags
  • Author
  • APT reports
  • Archive
  • DDoS reports
  • Events
  • Incidents
  • Industrial threats
  • Internal Threats Reports
  • Kaspersky Security Bulletin
  • Malware descriptions
  • Malware reports
  • News archive
  • Opinion
  • Publications
  • Research
  • SAS
  • Security technologies
  • Software
  • Spam and phishing mailings
  • Spam and phishing reports
  • Webcasts
<
  • 2019

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2018

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2017

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2016

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2015

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2014

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2013

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2012

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2011

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2010

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2009

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2008

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2007

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2006

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2005

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2004

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
    • Dec
  • 2003

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Sep
    • Oct
    • Nov
    • Dec
  • 2002

    • Jan
    • Feb
    • Mar
    • Apr
    • May
    • Jun
    • Jul
    • Aug
    • Sep
    • Oct
    • Nov
  • 2001

    • Feb
    • Apr
    • Jun
    • Jul
    • Aug
    • Dec
>
  • HOT
  • A .. G
  • H .. N
  • O .. U
  • V .. Z
  • 0 .. 9
  • Animal Farm
  • ARM
  • Base64
  • Bitscout
  • CAPTCHA
  • Certificate
  • Chronopay
  • DBIR
  • Dell
  • drive-by attack
  • Dropbox
  • FakeCry
  • gam
  • Google glass
  • GSM
  • Microsoft Excel
  • MuddyWater
  • Public transportation
  • RFID
  • sec
  • Simda
  • sinkholing
  • SQL injection
  • SSL
  • TLD
  • Ubuntu
  • USB-token
  • VMWare
  • WAP
  • WireLurker
  • Adobe
  • Adobe Flash
  • Adobe PDF
  • advertising networks
  • Adware
  • Amazon
  • AMD
  • Android
  • Animal Farm
  • Antivirus Technologies
  • Antivirus Testing
  • Antivirus Updates
  • Antivirus Vulnerabilities
  • Antiviruses
  • Apple
  • Apple iOS
  • Apple MacOS
  • Application Control
  • APT
  • Arabic Malware
  • ARM
  • ASUS
  • AT&T
  • ATM
  • ATM attacks
  • Backdoor
  • BadRabbit
  • Bagle
  • Base64
  • Biometric authentication
  • BIOS
  • Bitcoin
  • Bitscout
  • Black box
  • Blackberry
  • BlackEnergy
  • Bluetooth
  • Boleto
  • Bootkit
  • Boran
  • Botnets
  • Bozori
  • Brazil
  • Browser
  • Browser Plugins
  • BSides
  • Buffer Overflows
  • Cabir
  • CAPTCHA
  • Carbanak
  • Certificate
  • Certificate authorities
  • Chinese-speaking cybercrime
  • Chronopay
  • Cloud Computing
  • code injection
  • Comodo
  • Conferences
  • connected car
  • Content Filtering
  • Credentials theft
  • Credit Cards
  • Cross-platform malware
  • Cryptocurrencies
  • Cyber espionage
  • Cyber weapon
  • Cyberbullying
  • Cybercrime
  • Cybercrime Legislation
  • Darknet
  • Data Encryption
  • Data leaks
  • Data Protection
  • Data theft
  • DBIR
  • DDoS-attacks
  • Deception techniques
  • Default Deny
  • Dell
  • Digital Certificates
  • DLL hijacking
  • DNS
  • DNS Amplification
  • DNS manipulation
  • drive-by attack
  • drivers
  • Dropbox
  • Dropper
  • Duqu
  • eBay
  • Electronic Payments
  • Embedded system
  • Emotet
  • Encryption
  • Equation
  • EternalBlue
  • Exhibitions
  • ExPetr
  • Exploit Kits
  • Facebook
  • Fake AV
  • FakeCry
  • False Alarms
  • fileless malware
  • Financial malware
  • Firefox
  • Flame
  • Flashfake
  • Fraud
  • gam
  • Gaming Consoles
  • Gaming malware
  • Gauss
  • Google
  • Google Android
  • Google Chrome
  • Google glass
  • Gpcode
  • GSM
  • Gumblar
  • Hackers
  • Hacking Team
  • HDRoot
  • History of Malware
  • Hoaxes
  • honeypot
  • HTC
  • HTTPS
  • Identity Theft
  • Induc
  • Industrial control systems
  • Industrial threats
  • Infected Files and Devices
  • infrastructure
  • Instant Messengers
  • Intel
  • Internal Threats Statistics
  • Internet Banking
  • Internet of Things
  • IOActive
  • Java
  • JavaScript
  • KasperskyOS
  • Kelvir
  • Keyloggers
  • Kido
  • Koobface
  • Krotten
  • KSS
  • Law Enforcement
  • Lazarus
  • LdPinch
  • LinkedIn
  • Linux
  • Machete
  • machine learning
  • Macros
  • Madi
  • Malicious spam
  • Malvertizing
  • Malware
  • Malware Classification
  • Malware Creators
  • Malware Descriptions
  • Malware Miscellany
  • Malware Statistics
  • Malware Technologies
  • Mastercard
  • MBR
  • Medical threats
  • Microsoft
  • Microsoft ActiveX
  • Microsoft Excel
  • Microsoft Internet Explorer
  • Microsoft Office
  • Microsoft SQL
  • Microsoft Windows
  • Microsoft Word
  • Miner
  • Mirai
  • MITM
  • mobile browser
  • Mobile Malware
  • Mobile security
  • Money Mule
  • Money theft
  • Mozilla Foundation
  • MuddyWater
  • Mydoom
  • Mytob
  • Nation State Sponsored Espionage
  • Netsky
  • NetTraveler
  • NFC
  • Nigerian Spam
  • Non-Windows Malware
  • Novell
  • Nyxem
  • Obfuscation
  • Offline Phishing
  • Olympic Destroyer
  • Onion
  • Online Games
  • Oracle
  • P2P networks
  • Parental control
  • Passwords
  • Patch tuesday
  • Paypal
  • Petya
  • Phishing
  • Phishing websites
  • PHP
  • Piracy
  • PlugX
  • POS malware
  • PowerShell
  • Predictions
  • Privacy
  • proactive protection
  • ProjectSauron
  • Proof-of-Concept
  • Public key infrastructure
  • Public transportation
  • RaaS
  • Ransomware
  • RAT Trojan
  • RDP
  • RedHat
  • Reverse engineering
  • RFID
  • Rogue Security Solutions
  • Rooting Trojan
  • Rootkits
  • Router
  • Russian-speaking cybercrime
  • Safari
  • Sality
  • Santy
  • Sasser
  • Scada
  • Search Engines
  • sec
  • Secure OS
  • Security conference
  • Security Policies
  • Security technology
  • Security Websites
  • Shadow Brokers
  • Shamoon
  • Shellshock
  • Simda
  • sinkholing
  • Sinowal
  • Skype
  • Smart City
  • Smart home
  • SmartTV
  • SMS Trojan
  • Sober
  • Social Engineering
  • Social networks
  • Sofacy
  • Sony
  • Spam and the law
  • Spam Letters
  • Spam Statistics
  • Spammer techniques
  • Spear Phishing
  • spoofing
  • SpyEye
  • Spyware
  • SQL injection
  • SSL
  • Stalkerware
  • steganography
  • Stuxnet
  • SunOS / Solaris
  • supply-chain attack
  • Syria
  • Targeted Attacks
  • TDSS
  • TeamXRat
  • Thematic phishing
  • Thematic Spam
  • TheSAS2016
  • TheSAS2017
  • TLD
  • TOR
  • Torrent
  • Trainings
  • Trojan
  • Trojan Banker
  • Trojan Clicker
  • Trojan-Dropper
  • Trojan-Spy
  • Trojan-stealer
  • Trusted Environment
  • Turla
  • Twitter
  • Ubuntu
  • UEFI
  • USB-token
  • VBMania
  • Verisign
  • Verizon
  • Virtualization
  • Virus Writers Wars
  • VISA
  • VMWare
  • VPN
  • Vulnerabilities
  • Vulnerabilities and exploits
  • Vulnerability Statistics
  • WannaCry
  • WAP
  • Wardriving
  • Warezov
  • Watering hole attacks
  • Wearable devices
  • Website Hacks
  • WhatsApp
  • Whitelisting
  • Wi-Fi
  • Winamp
  • Winnti
  • Wiper
  • WireLurker
  • Worm
  • x64
  • XSS
  • Zafi
  • Zebrocy
  • Zero-day vulnerabilities
  • ZeuS
  • Zhelatin
  • Ztorg
  • a .. g
  • h .. n
  • o .. u
  • v .. z
  • 0 .. 9
  • Aime, Félix
  • Alon, Noam
  • Alyushin, Victor
  • Amin Hasbini, Mohamad
  • Andreeva, Oxana
  • Antukh, Alexander
  • Armstrong, Tim
  • Aseev, Eugene
  • Assolini, Fabio
  • Badovskaya, Ekaterina
  • Bakhmutov, Andrey
  • Bartholomew, Brian
  • Baumgartner, Kurt
  • Belov, Sergey
  • Berdnikov, Vasily
  • Bestuzhev, Dmitry
  • Bogdanov, Vyacheslav
  • Bondarenko, Elena
  • Bronnikova, Daria
  • Brulez, Nicolas
  • Buchka, Nikita
  • Bulavas, Vladas
  • But, Andrey
  • Chebyshev, Victor
  • Cheremushkin, Pavel
  • Coursen, Shane
  • Creus, Dani
  • Dashchenko, Vladimir
  • Davydov, Vasily
  • Demeter, Dan
  • Demidova, Nadezhda
  • Denisov, Vitaly
  • Diaz, Vicente
  • Dolgushev, Andrey
  • Dolya, Alexey
  • Dovgopol, Roman
  • Dronov, Victor
  • Dumitru, Claudiu
  • Efremov, Andrey
  • Emelyanova, Olga
  • Emm, David
  • Eremin, Alexander
  • Fedorova, Mariya
  • Fedotov, Nikolay
  • Firsh, Alexey
  • Fisher, Dennis
  • Funk, Christian
  • Galov, Dmitry
  • Garnaeva, Maria
  • Godwood, Ben
  • Goland, Dani
  • Golovanov, Sergey
  • Golovin, Igor
  • Golovkin, Maxim
  • Gorchakov, Denis
  • Gorobets, Oleg
  • Gostev, Alexander
  • GReAT,
  • Grachev, Igor
  • Grebennikov, Nikolay
  • Gudilin, Oleg
  • Gudkova, Darya
  • Guerrero-Saade, Juan Andrés
  • Gutnikov, Alexander
  • Herkanaidu, Ram
  • Hioureas, Vasilios
  • Ibragimov, Timur
  • ICS CERT, Kaspersky Lab
  • Ignatiev, Konstantin
  • Ilganaev, Kirill
  • Ishimaru, Suguru
  • Ivanov, Anton V.
  • Ivanov, Anton
  • Jacoby, David
  • Janus, Marta
  • Jordan, David
  • Kadiev, Alexei
  • Kalimanova, Katerina
  • Kalinin, Andrey
  • Kalkuhl, Magnus
  • Kamluk, Vitaly
  • Karasovsky, Dmitry
  • Kaspersky, kaspersky
  • Kazantsev, Anatoly
  • Khalimonenko, Alexander
  • Kholopova, Vera
  • Khudyakov, Andrey
  • Kivva, Anton
  • Kochetova, Olga
  • Kolesnikov, Alexander
  • Kollberg, Dirk
  • Kolotinsky, Evgeny
  • Komarov, Alexey
  • Kopeytsev, Vyacheslav
  • Kostin, Andrey
  • Kruglov, Kirill
  • Krylova, Evgeniya
  • Krylov, Vladimir
  • Kryukov, Andrey
  • Kulikova, Tatyana
  • Kupreev, Oleg
  • Kuskov, Evgeny
  • Kuskov, Vladimir
  • Kuzin, Mikhail
  • Kuzmenko, Anton
  • Kuzmenko, Roman
  • Ladikov, Andrey
  • Larin, Boris
  • Larkina, Anna
  • Legezo, Denis
  • Liskin, Alexander
  • Lopatin, Evgeny
  • Lozhkin, Sergey
  • Lurye, Sergey
  • Makhnutin, Andrey
  • Makrushin, Denis
  • Malanov, Alexey
  • Mamedov, Orkhan
  • Mareichev, Petr
  • Markov, Konstantin
  • Marques, Thiago
  • Martinez, Roberto
  • Mashevsky, Yury
  • Maslennikov, Denis
  • Mieres, Jorge
  • Mineev, Sergey
  • Molsner, Michael
  • Monastyrsky, Alexey
  • Moore, Daniel
  • Muravitsky, Andrey
  • Namestnikova, Maria
  • Namestnikov, Yury
  • Naor, Ido
  • Naraine, Ryan
  • Nazarov, Denis
  • Nikishin, Andrey
  • Nikolenko, Lyubov
  • Novikova, Yuliya
  • Novikov, Sergey
  • Okhotin, Sergey
  • Olsen, Bo
  • Onishchenko, Alexander
  • Ortloff, Stefan
  • Ortolani, Stefano
  • Osipov, Alexey
  • Ovchinnikov, Artemy
  • Pakulov, Artur
  • Parinov, Denis
  • Parys, Bart
  • Pikman, Lev
  • Pintiysky, Vladislav
  • Plakhov, Alexander
  • Pomerantsev, Ilya
  • Pontiroli, Santiago
  • Potseluevskaya, Evgeniya
  • Preuss, Marco
  • Prokhorenko, Mikhail
  • Rid, Thomas
  • Rosén, Frans
  • Rubinstein, Maria
  • Rubin, Andrey
  • Rudina, Ekaterina
  • Rusakov, Vyacheslav
  • Saad, Ghareeb
  • Sako, Roland
  • Samekh, Mary-Beth
  • Sapronov, Konstantin
  • Schouwenberg, Roel
  • Semenchenko, Artem
  • Seow, Alan
  • Shaaban, Ayman
  • Shabab, Noushin
  • Shadrin, Alexander
  • Shcherbakova, Tatyana
  • Shevchenko, Alisa
  • Shevchenko, Stanislav
  • Shishkova, Tatyana
  • Shmelev, Yaroslav
  • Shulmin, Alexey
  • Shvetsov, Dmitry
  • Shvetsov, Nikita
  • Sidorina, Tatyana
  • Sinitsyn, Fedor
  • Sitchikhin, Denis
  • Slepogin, Nikita
  • Soldatov, Sergey
  • Soumenkov, Igor
  • Stepanov, Boris
  • Stolyarov, Vladislav
  • Stoyanov, Ruslan
  • Strohschneider, Jens
  • Sytnik, Mikhail
  • Tanase, Stefan
  • Tarakanov, Dmitry
  • Temnikov, Sergey
  • Tenreiro, André
  • Unuchek, Roman
  • Vasilenko, Egor
  • Vergelis, Maria
  • Vilkov, Dmitry
  • Vinogradov, Dmitry
  • Vlasova, Anna
  • Vlasova, Victoria
  • Volodina, Anna
  • van der Wiel, Jornt
  • Werner, Tillman
  • Wicherski, Georg
  • Willems, Eddy
  • Yampolsky, Boris
  • Yan, Dong
  • Yunakovsky, Sergey
  • Yurzin, Oleg
  • Zablotskaya, Natalya
  • Zaitsev, Alexander
  • Zaitsev, Oleg
  • Zakorzhevsky, Vyacheslav
  • Zapolyansky, Vladimir
  • Zelensky, Pavel
  • Zelensky, Sergey
  • Zhang, Vigi
  • Zhuravlev, Maxim
  • Ziarek, Maciej
  • Zykov, Konstantin

© 2019 AO Kaspersky Lab. All Rights Reserved.
Registered trademarks and service marks are the property of their respective owners.

Contact us | Privacy Policy | License Agreement

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • RSS
  • Email