The Glossary contains several hundred definitions of terms that you might come across in our articles and blogs, or on other information security sites. Unlike the in-depth articles in the Knowledge Base, every definition in the Glossary is succinct, while remaining highly informative.
(This section is currently under construction)
In the Knowledge Base, you will find various articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats.
The Knowledge Base now has three main sections:
– The Detectable Objects section gives detailed information about malicious and potentially dangerous programs that we protect users against every single day all around the world, as well as advice on what to do in case of infection.
– In the Spam and Phishing section, you will learn about phishing and spam mailings, how their creators earn money from them, and how this type of threat has evolved since the 1990s to the present day.
– The articles in the Vulnerabilities and Hackers section is devoted to the topic of software vulnerabilities and how cybercriminals exploit them, as well as legislation and hackers in the broad sense of the word.
Welcome to the Kaspersky Lab IT Encyclopedia. Want to know who creates malware and why? Why are unwanted messages in email and social networks dangerous? What are “vulnerabilities” and how do cybercriminals exploit them? The answers to these and other questions are right here.
Our subsite consists of two main sections: the Knowledge Base and the Glossary. Both are works in progress and being supplemented all the time, but are already highly informative and vital resources. In the Knowledge Base, you will find numerous articles about common threats, a general classification of malware and unwanted messages, and a brief historical overview of the evolution of these and many other threats. As for the Glossary, it contains short definitions of terms that are frequently encountered in our articles and blogs, as well as other resources devoted to information security.
To navigate them, use the search bar or select one of the categories below.