Internet Security Threats | Online Safety Tips | Kaspersky Lab NL
  • content/nl-nl/images/repository/isc/whattodoifyouremail-thumbnail.jpg

    What to Do if Your Email Account Has Been Hacked

    The ubiquitous nature of email combined with its continued growth makes your accounts a tempting target for hackers. If you become the victim of a hacked email account, here's what you need to do to remedy the situation.

    Read More
  • content/nl-nl/images/repository/isc/identity-theft-thumbnail.jpg

    What to Do if Your Identity is Stolen: A Step-By-Step Guide

    In 2014, the Consumer Federation of America performed a survey of consumer agencies that pointed to identity theft as the fastest-growing complaint they've received. Follow this step-by-step guide on what to do if your identity is stolen.

    Read More
  • /content/nl-nl/images/repository/fall-back/57.jpg

    Wat zijn schadelijke tools?

    Schadelijke tools zijn schadelijke softwareprogramma's die zijn ontworpen om automatisch virussen, wormen of trojans te maken waarmee DoS-aanvallen worden uitgevoerd op externe servers...

    Read More
  • content/nl-nl/images/repository/isc/online-dating-scams-thumbnail.jpg

    Anatomy of Online Dating Scams - How Not to Become a Victim of Cyber-romance

    Romance scams lead to the largest per-person losses of any Internet fraud, with the average victim losing more than $100,000. Here’s a quick look at the anatomy of a dating scam, and how you can avoid fake romance.

    Read More
  • /content/nl-nl/images/repository/fall-back/46.jpg

    Cybercriminaliteit

    Perhaps the most dangerous types of malware creators are the hackers and groups of hackers that create malicious software programs in an effort to meet their own specific criminal objectives...

    Read More
  • content/nl-nl/images/repository/isc/hackers-475-317-thumbnail.jpg

    Top Ten Most Notorious (Infamous) Hackers of All Time

    Hacking costs companies and consumers many millions of dollars each year. Much of the problem stems from the advent of the internet, so amateur hackers can find all the tools they need online at virtually no cost. But this proliferation of hacking didn't emerge overnight...

    Read More
  • content/nl-nl/images/repository/isc/trojan-virus-500-328-thumbnail.jpg

    Top 7 Cyberthreats to Watch Out for in 2015-2016

    These are boom times for cyberthreats, cyberattacks and cybercrime. Here are the seven ongoing threats that showcase today's challenges in keeping your data protected.

    Read More
  • /content/nl-nl/images/repository/fall-back/63.jpg

    Computervandalisme

    In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type of behaviour is also present in cyberspace...

    Read More
  • /content/nl-nl/images/repository/fall-back/07.jpg

    Diefstal

    The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive-by attack may seem positive, but only at a first glance.The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive...

    Read More
  • /content/nl-nl/images/repository/fall-back/10.jpg

    Wat is pornware?

    Pornware is de naam voor een type programma waarmee pornografisch materiaal wordt weergegeven op een apparaat. Sommige gebruikers installeren op hun computer en mobiele apparaat mogelijk bewust programma's om pornografisch materiaal te zoeken en weer te geven.

    Read More
Resources not available.