Research

Curious kids: 3,000 attempts to visit porn sites every minute

The Pornography category in the Parental Control system of Kaspersky Lab’s home user products is triggered over 4 million times a day. In other words, there are about 3,000 attempts to access adult content sites by minors every minute. This is confirmed by data collected worldwide using Kaspersky Security Network technology.

Number of times the Pornography category was triggered in the Parental Control module

As can be seen from the graph compiled by the Web Content Analysis Group at Kaspersky Lab, the majority of attempts to enter porn sites are made in the evening with a peak of activity at 11 pm.

The Parental Control module implemented in Kaspersky PURE and Kaspersky Internet Security 2011 allows parents to restrict the time that children are permitted to use the Internet and the computer. They can also restrict the download of inappropriate files from the Internet, regulate access to specific programs and sites and log their children’s instant messaging and social networking communications on ICQ, MSN and other similar sites.

Curious kids: 3,000 attempts to visit porn sites every minute

Your email address will not be published. Required fields are marked *

 

Reports

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Subscribe to our weekly e-mails

The hottest research right in your inbox