Research

Curious kids: 3,000 attempts to visit porn sites every minute

The Pornography category in the Parental Control system of Kaspersky Lab’s home user products is triggered over 4 million times a day. In other words, there are about 3,000 attempts to access adult content sites by minors every minute. This is confirmed by data collected worldwide using Kaspersky Security Network technology.

Number of times the Pornography category was triggered in the Parental Control module

As can be seen from the graph compiled by the Web Content Analysis Group at Kaspersky Lab, the majority of attempts to enter porn sites are made in the evening with a peak of activity at 11 pm.

The Parental Control module implemented in Kaspersky PURE and Kaspersky Internet Security 2011 allows parents to restrict the time that children are permitted to use the Internet and the computer. They can also restrict the download of inappropriate files from the Internet, regulate access to specific programs and sites and log their children’s instant messaging and social networking communications on ICQ, MSN and other similar sites.

Curious kids: 3,000 attempts to visit porn sites every minute

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q3 2021

The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest installment, focusing on activities that we observed during Q3 2021.

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

Subscribe to our weekly e-mails

The hottest research right in your inbox