Resource Center Category | Kaspersky Lab NL

THREATS:

  • content/nl-nl/images/repository/isc/Kaspersky-Lab-Infographics-Android-Threats-in-2012-thumbnail.jpg

    Android Mobile Security Threats

    With more and more people using their smartphones and tablets to surf the web, update social networking sites and shop & bank online, cybercriminals and malware are increasingly targeting mobile devices – with new smartphone threats and mobile threats.

    Read More
  • /content/nl-nl/images/repository/fall-back/29.jpg

    Dreigingen voor mobiele apparaten

    With more and more people using their smartphones and tablets to surf the web, update social networking sites and shop & bank online, cybercriminals and malware are increasingly targeting mobile devices – with new smartphone threats and mobile threats.

    Read More
  • /content/nl-nl/images/repository/fall-back/32.jpg

    Onbruikbare computers en systeemnetwerken

    Computer viruses and Trojan viruses can severely affect the performance of an individual computer or cause the total failure of an entire system network. A wide range of these operability issues can be either...

    Read More
  • /content/nl-nl/images/repository/fall-back/18.jpg

    Wat is een trojan?

    Trojans zijn schadelijke programma's waarmee acties worden uitgevoerd die niet zijn geautoriseerd door de gebruiker.

    Read More
  • content/nl-nl/images/repository/fall-back/14.jpg

    Computer Viruses and Malicious Software

    Over the years, malicious software – or malware – has developed into an extremely serious threat that can place your computer… your precious files, photos, music and financial information… your money… and your children… at risk. However, there are steps you can take to ensure you don’t become a victim of today’s increasingly sophisticated cyberattacks and Internet security threats.

    Read More
  • content/nl-nl/images/repository/fall-back/28.jpg

    Targeted Attacks

    Unlike mass computer virus attacks – that aim to infect as many computers as possible – targeted attacks use a totally different approach. Instead, targeted attacks try to infect the network of a single targeted company or organisation – or apply a specially developed Trojan agent to a single server on the organisation’s network infrastructure.

    Read More
  • content/nl-nl/images/repository/fall-back/46.jpg

    Crouching Yeti (Energetic Bear) Malware

    Crouching Yeti is a threat involved in several advanced persistent threat (APT) campaigns that have been active going back to at least the end of 2010.

    Read More
  • content/nl-nl/images/repository/isc/trojan-virus-500-328-thumbnail.jpg

    Top 7 Cyberthreats to Watch Out for in 2015-2016

    These are boom times for cyberthreats, cyberattacks and cybercrime. Here are the seven ongoing threats that showcase today's challenges in keeping your data protected.

    Read More
  • content/nl-nl/images/repository/fall-back/65.jpg

    Inoperable Computers and System Networks

    Computer viruses and Trojan viruses can severely affect the performance of an individual computer or cause the total failure of an entire system network. A wide range of these operability issues can be either intended by the malware creator or completely accidental.

    Read More
  • /content/nl-nl/images/repository/fall-back/04.jpg

    Malware-implementatietechnieken

    Cybercriminals often exploit any vulnerabilities that exist within the operating system (OS) or the application software that’s running on the victim’s computer – so a net worm or Trojan virus can penetrate the victim’s machine and launch itself.

    Read More
Resources not available.