Search

  • Kaspersky Lab’s new security products bring sterling protection to home users’ privacy, digital identity, money and data across different devices
    ...updated product line for home users: Kaspersky Anti-Virus 2015, Kaspersky Internet Security 2015 and Kaspersky Internet Security – Multi-Device 2015. The solutions were developed to protect users of Windows, OS X and Android devices from existing and new threats – making their online lives easier and safer.Research conducted by Kaspersky Lab and B2B International indicates that Internet user’...
  • Kaspersky Total Security – Multi-Device 2017
    ...compatible web-cameras. For the full list of compatible devices, please visit: https://support.kaspersky.com/12732 (for PCs) https://support.kaspersky.com/12476 (for Mac computers) Windows®-based desktops and laptops 1020 MB free space on the hard drive Microsoft® Internet Explorer® 81 or higher Microsoft .NET Framework 4 or higher Microsoft Windows 102 Home / Pro ...
  • Crimeware
    ...will help minimize the risk of attack. Protect your computer by installing Internet security software. Install security patches for your operating system and applications. If you use Windows® simply switch on Automatic Updates. And don’t forget to update Microsoft® Office. If you receive an email with an attached file (Word documents, Excel spreadsheets, .EXE files, etc.) don’t...
  • Forever Lost: 44% of People Could not Recover Money Stolen as a Result of Fraud
    ...Head of Consumer Product Management, Kaspersky Lab.For example, Kaspersky Internet Security – Multi-Device, in addition to basic tools that combat cyber threats, integrate Safe Money technology for Windows and OS X. This technology was developed specifically to provide additional security for online transactions. When a user accesses a payment service or is about to make a purchase from an online...
  • Top award for Kaspersky Internet Security 2013 in the MRG Effitas Real-World Protection Test
    ...designed to steal financial information), ransomware, malicious programs with integrated rootkit functionality and other dangerous types of malware. The testing was conducted on computers running Windows 7 SP 1 32 bit. These PCs were also set up with a suite of popular applications which have vulnerabilities regularly exploited by hackers.Kaspersky Lab’s product competed alongside 16 other...
  • Constantly on Top – Kaspersky Internet Security wins another top independent award
    ...threats: AV-Comparatives experts only used those malware samples which were found in real-world Internet malware attacks from March to June 2013.The testing was conducted on computers running under Windows 7 with popular applications installed such as Adobe Reader, Flash, Flash Player ActiveX, Apple QuickTime, Microsoft Internet Explorer, Office, NET Framework, Mozilla Firefox, Oracle Java, and...
  • Kaspersky Lab Launches a Powerful Security Solution for Mac-Savvy Businesses
    ...the number of Mac-specific malware is also rising. Another common trend is the wide spread of heterogeneous networks within mid-sized businesses and enterprises. The variety of platforms (including Windows, Mac, Linux and virtual environments) used in modern organizations makes it difficult to protect the IT environment and valuable business data. In addition, decentralized computing makes the...
  • Kaspersky Lab contributes to global effort targeting Shylock malware
    ...from the operational centre in The Hague.Shylock – so-called because its code contains excerpts from Shakespeare’s The Merchant of Venice – has infected at least 30,000 computers running Microsoft Windows worldwide. Intelligence suggests that Shylock targets the UK more than any other country; however, the US, Italy and Turkey are also being targeted by the malicious code. It’s thought that the...
  • My Private Mac: Kaspersky Lab Releases New Kaspersky Internet Security for Mac with More Privacy Features
    ...such as phishing, a poorly protected connection, a lack of user cyber-savviness and other weak points – in fact make it possible for cybercriminals to harm users on almost any device, whether it is Windows, Mac, Android, or an iPhone. That’s why in our new security solution for OS X we have paid special attention to technologies that secure user privacy online – including Webcam Protection and...
  • Computer Threats FAQ
    ...trying to gain unauthorized access to a computer. The term originated in the Unix world, although it has since been applied to the techniques used by authors of Trojans that run under Microsoft® Windows® to conceal their actions. Rootkits have been used increasingly as a form of stealth to hide Trojan activity. When installed on the system, rootkits are not only invisible to users, but they are...