<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/sv-se/images/repository/fall-back/58.jpg

    Vulnerability Exploits & Malware Implementation Techniques

    Cybercriminals often exploit any vulnerabilities that exist within the operating system (OS) or the application software that’s running on the victim’s computer – so a net worm or Trojan virus can penetrate the victim’s machine and launch itself.

    Read more
  • content/sv-se/images/repository/fall-back/sms-trojans-thumbs.png

    SMS Attacks and Mobile Malware Threats

    The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive-by attack may seem positive, but only at a first glance.The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive...

    Read more
  • content/sv-se/images/repository/isc/Kaspersky-Lab-Inforgaphic-Botnet-thumbnail.jpg

    What is a Botnet?

    The word Botnet is formed from the words ‘robot’ and ‘network’. Cybercriminals...

    Read more
  • /content/sv-se/images/repository/fall-back/40.jpg

    Användarbas och popularitet

    Om ett specifikt operativsystem ska locka hackare och cyberbrottslingar att utveckla datorvirus, maskar och trojaner för att angripa enheter som kör det, bör det vara populärt och användas av många...

    Read more
  • content/sv-se/images/repository/isc/kaspersky-lab-infographic-safe-money-10-172210-inline.png

    Stealing Electronic Currency

    In addition to using Trojan viruses to steal money from personal and corporate bank accounts , cybercriminals are also creating and distributing Trojan spy programs that steal ‘online currency’ from users’ personal e-wallets – for example, from a user’s e-gold or WebMoney account...

    Read more
  • content/sv-se/images/repository/isc/computer-security-mistakes-thumbnail.jpg

    What Malware Needs to Thrive

    Users often make the same common mistakes that are easily exploited. Here is a rundown of the top 10 mistakes users make and how to avoid them to keep you and your network safe.

    Read more
  • content/sv-se/images/repository/isc/onlinegamingdangers-thumbnail.jpg

    Top 7 Online Gaming Dangers & Risks for Kids and Teens

    While online gaming can provide quality social interaction, there's a darker side. From cyberbullying to online predators to hidden costs, there are many concerns when it comes to playing video games online. Here's a list of the top seven dangers and simple tips to keep your kids safe online.

    Read more
  • content/sv-se/images/repository/fall-back/47.jpg

    Darkhotel Malware (APT) Virus Threat

    The latest virus threat attack, called 'Darkhotel', has been analysed by Kaspersky Lab’s Global Research and Analysis Team. The Darkhotel threat appears to be a combination of spear phishing and dangerous malware designed to capture confidential data.

    Read more
  • content/sv-se/images/repository/isc/spyware-150x150-3440.jpg

    Annonsprogram, porrprogram och riskprogram

    Annonsprogram, porrprogram och riskprogram innehåller legitimt utvecklade program som, i vissa fall, kan användas för att utsätta datoranvändare för hot (inklusive att fungera som spionprogram)...

    Read more
  • /content/sv-se/images/repository/fall-back/46.jpg

    Obrukbara datorer och systemnätverk

    Datorvirus och trojanska virus kan allvarligt påverka funktionen för en enskild dator eller få ett helt systemnätverk att sluta fungera. En stor mängd av dessa driftsproblem kan antingen vara avsedda av skaparen av den skadliga programvaran, eller vara helt oavsiktliga:..

    Read more
Resources not available.