Welcome to Encyclopedia

Welcome to the Kaspersky Lab IT Encyclopedia. Want to know who creates malware and why? Why are unwanted messages in email and social networks dangerous? What are “vulnerabilities” and how do cybercriminals exploit them? The answers to these and other questions are right here.

Our subsite consists of two main sections: the Knowledge Base and the Glossary. Both are works in progress and being supplemented all the time, but are already highly informative and vital resources. In the Knowledge Base, you will find numerous articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats. As for the Glossary, it contains short definitions of terms that are frequently encountered in our articles and blogs, as well as other resources devoted to information security.

To navigate them, use the search bar or select one of the categories below.

Detected Objects

Malware comes in many colorfully-named varieties. Trojans, viruses, rootkits, bootkits etc, and each carefully-designed with damage in mind! Find out how KL products detect and eliminate them.

Spam and Phishing

Spam's about much more than just unsolicited advertisements. It's a powerful phishing tool that tricks unwary users into divulging personal details. Here's how to avoid it!

Vulnerabilities and Hackers

Effective maintenance means reliable computer protection! Hackers exploit software loopholes and cracks to steal your data. By observing these few simple rules you can stay safe.