Who creates malicious programs and why? How are unwanted messages in email and social media dangerous? What is a ‘vulnerability’ and how cybercriminals use it? In our encyclopedia, we have brought together the answers to these and many other questions.

To navigate, please use the search box or select one of the main categories below.

Detected Objects

Malware comes in many colorfully-named varieties. Trojans, viruses, rootkits, bootkits etc, and each carefully-designed with damage in mind! Find out how KL products detect and eliminate them.

Spam and Phishing

Spam's about much more than just unsolicited advertisements. It's a powerful phishing tool that tricks unwary users into divulging personal details. Here's how to avoid it!

Vulnerabilities and Hackers

Effective maintenance means reliable computer protection! Hackers exploit software loopholes and cracks to steal your data. By observing these few simple rules you can stay safe.