<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt="" />
  • content/it-it/images/repository/isc/2017-images/malware-img-06.jpg

    Cosa sono gli Spyware e cosa fanno?

    Adware, Pornware and Riskware include legitimately developed programs that – in some circumstances – can be used to pose specific threats to computer users (including acting as spyware).

    Read more
  • content/it-it/images/repository/isc/2017-images/malware-img-23.jpg

    The Epic Turla (snake/Uroburos) attacks

    Turla, also known as Snake or Uroburos is one of the most sophisticated ongoing cyber-espionage campaigns. The latest Kaspersky Lab research on this operation reveals that Epic is the initial stage of the Turla victim infection mechanism. Targets of “Epic” belong to the following categories: government entities (Ministry of Interior, Ministry of Trade and Commerce, Ministry of Foreign/External affairs, intelligence agencies), embassies, military, research and education organizations and pharmaceutical companies.

    Read more
  • content/it-it/images/repository/isc/2017-images/mobile-img-04.jpg

    Smartphone Security

    Mobile device use is on the rise because smartphones and tablets are quickly becoming more powerful as companies embrace the idea of bring your own device (BYOD) policies and allow users to access corporate networks with personal technology.

    Read more
  • content/it-it/images/repository/isc/2017-images/web-img-14.jpg

    Minacce sul Web

    Le minacce basate sul Web, o minacce online, sono programmi malware che colpiscono gli utenti mentre usano Internet. Queste minacce basate sul browser comprendono una vasta gamma di programmi software nocivi progettati per infettare i computer delle vittime...

    Read more
  • content/it-it/images/repository/isc/2017-images/malware-img-63.jpg

    Types of Spyware

    Adware, Pornware, and Riskware include legitimately developed programs that...

    Read more
  • /content/it-it/images/repository/fall-back/63.jpg

    Tecniche di implementazione del malware

    Spesso i cybercriminali sfruttano le vulnerabilità presenti nel sistema operativo o nelle applicazioni in esecuzione sul computer della vittima; in questo modo un worm di rete o un virus trojan può penetrare nella macchina della vittima e avviarsi...

    Read more
  • content/it-it/images/repository/isc/2017-images/malware-img-08.jpg

    Adwind: Malware-as-a-Service Platform

    Adwind: Malware-as-a-Service Platform - Threat Definition

    Read more
  • content/it-it/images/repository/isc/2017-images/threats-img-01.jpg

    Cosa sono i packer sospetti?

    Per impedire il reverse engineering di un software malevolo e per ostacolare l'analisi del comportamento del programma, gli sviluppatori di malware possono comprimere i programmi malevoli utilizzando vari metodi combinati con la crittografia...

    Read more
  • content/it-it/images/repository/isc/2017-images/malware-img-22.jpg

    Gli attacchi mirati Duqu 2.0

    Duqu 2.0 is a highly sophisticated malware platform exploiting up to three zero-day vulnerabilities with infections linked to the P5+1 events and venues for high level meetings between world leaders.

    Read more
  • content/it-it/images/repository/isc/2017-images/malware-img-18.jpg

    Darkhotel Malware (APT) Virus Threat

    The latest virus threat attack, called 'Darkhotel', has been analysed by Kaspersky Lab’s Global Research and Analysis Team. The Darkhotel threat appears to be a combination of spear phishing and dangerous malware designed to capture confidential data.

    Read more
Resources not available.