Your browser is obsolete!

The page may not load correctly.

Published issues, by category

Just email

Just email

Spam isn't just annoying, it can be dangerous: open an attached document from an unknown sender and anything can happen to your computer!

All publications in this category: 24

Data hub

Data hub

An information security calendar: dates and events that happened or are still happening.

All publications in this category: 5

DDoSsier

DDoSsier

If you want to visit a website but it isn’t loading, it is very likely that the website is under a DDoS attack: a huge number of concurrent requests are being sent to the server to freeze the website so that the intruders can achieve their goals. Such attacks require significant hardware capabilities which are provided by the computers of ordinary users. How can you prevent your computer from participating in such attacks?

All publications in this category: 5

The archives

The archives

Many malicious programs and malware outbreaks have found their way into the history books, and are remembered by security professionals and ordinary users alike. Here you can find key moments in the history of malware.

All publications in this category: 2

The rules of ”basic hygiene”

The rules of ”basic hygiene”

We have experience maintaining information security, and we'd like to share it with you!

All publications in this category: 104

Evil Kitchen

Evil Kitchen

Find out what lengths criminals will go to in order to serve you the "perfect dish".

All publications in this category: 13

Web psychology

Web psychology

The impact of technology on our mental health is much stronger than commonly thought. Apart from benefits that include instant access to information and remote communication, there are negative aspects including Internet addiction, personality changes, etc.

All publications in this category: 4

Weak links

Weak links

Criminals can exploit some technologies without using malware, and anti-viruses can't do anything about it. Read our new column to find out more about these weak links.

All publications in this category: 18

Anti-virus fallacies

Anti-virus fallacies

There exist all sorts of myths and misconceptions about anti-virus security, and we never get tired of dispelling them.

All publications in this category: 39

Android territory

Android territory

The more popular Android becomes, the more criminals are interested in it. Threats to Android are rather diverse. They include, lockers, banking Trojans, programs that covertly send short messages, and more.

All publications in this category: 22

Food for thought

Food for thought

A speculative look at modern trends in the world of information security; reflections on our digital past, present, and future.

All publications in this category: 29

The office in your pocket

The office in your pocket

People who use their laptops, desktops and handhelds for work often forget that their devices store valuable information, and criminals areprepared to go to great lengths to get it. And we remind you about that!

All publications in this category: 3

Some levity

Some levity

Anything can happen in life: sometimes even important IT security issues take such a wacky turn that one can’t help but smile.

All publications in this category: 7

DETECTives

DETECTives

Sometimes malware or hacker activities can't be detected by an anti-virus alone. Often these activities require an extensive investigation. Doctor Web already has valuable experience in this field, builds upon it and shares the results with its Anti-virus Times readers.

All publications in this category: 5

Digital me

Digital me

Today, biometrics is the most reliable way to verify someone’s identity, although this method is not without risks. Does biometric data require special storage conditions? Is it possible to forge a biometric passport? And what problems can people encounter when their biometric data gets stolen?

All publications in this category: 1

Encrypt everything

Encrypt everything

Encryption ransomware that turns data into a meaningless string of symbols and then demands a ransom to decrypt it is today’s No. 1 threat. However, if you are forearmed, they are not really that dangerous.

All publications in this category: 24

Unexpected guests

Unexpected guests

How malicious programs find ways to penetrate your PC or handheld, even if the “front door” is locked.

All publications in this category: 70

The price tag

The price tag

Figures that stagger the imagination: the damage caused by malware and hackers is sometimes expressed in numbers containing lots of zeros.

All publications in this category: 13

Terminology

Terminology

Information security is an area of knowledge in its own right, and it has its own terminology. But understanding it is easy!

All publications in this category: 40

Banknote thieves

Banknote thieves

For criminals, your money is their most desired target. They have an entire arsenal of tricks and malware to reach it. However, we know a lot about them!

All publications in this category: 8

Configure it!

Configure it!

Any weapon against intruders is even more effective if a user knows exactly how to use it: know Dr.Web’s settings and the settings of other programs inside out so that you can keep your system secure.

All publications in this category: 44

Vulnerable

Vulnerable

Everybody makes mistakes and so do software developers. Loopholes exist in any piece of software, and criminals try to exploit them to get into the system. Here you can find information about some examples of vulnerabilities and the dangers they present.

All publications in this category: 35

Con artists

Con artists

Exploiting human curiosity, passions, and carelessness: About social engineering and how fraudsters deceive Internet users.

All publications in this category: 24

Snared in the net

Snared in the net

Social media often presents a severe danger because nobody expects dirty tricks to be played on them when seemingly among friends. However, threats on social networking sites are often disguised as messages from friends and other trusted people.

All publications in this category: 5

Look out for your things!

Look out for your things!

While trying to look out for our things, we fail to notice that our things have learned how to look out for us-and not in a good way. The smarter our TVs, baby monitors, cars, and pacemakers become, the more criminals are interested in them. Threats from the world of smart things are already real!

All publications in this category: 14

The workshop

The workshop

We will lift the veil of secrecy and tell you how the Doctor Web laboratory works and how the anti-virus is created!

All publications in this category: 38

Persona (non) grata

Persona (non) grata

Your personal information in the hands of criminals is their key to getting rich. Find out how this information can be stolen and converted into money.

All publications in this category: 26

Tips

Tips

Not all tips are equally useful, and some can even be harmful, if you don’t treat them with humour.

All publications in this category: 4

Caught

Caught

Unscrupulous “fishermen” drop their baited lines on the web and wait for gullible victims to “bite”. Their arsenal of bait is quite impressive but recognising what’s on their “lures” isn't that difficult!

All publications in this category: 15

Behind bars

Behind bars

Nowadays, cybercriminals are more frequently getting their just punishment. We have collected information about the most notable court rulings involving hackers.

All publications in this category: 6

“Botology” basics

“Botology” basics

A computer should serve its user rather than an invisible intruder who can utilise the machine's resources remotely for their shady dealings. Botnets: how machines get into them, how to avoid them, why they are created, and how they are used.

All publications in this category: 4

Unmasking the criminals

Unmasking the criminals

Sometimes criminals don't even need malware to steal money from bank cards. However, you can protect yourself from even these malware-free techniques!

All publications in this category: 2

They were the first

They were the first

A short journey into the history of IT to recall the first malicious programs and information security technologies. This industry is evolving at a rapid pace!

All publications in this category: 7

Straight from the horse’s mouth

Straight from the horse’s mouth

Our users share real-life stories about infections.

All publications in this category: 3

Spies are everywhere

Spies are everywhere

There are many ways to spy on users. Spyware can even covertly toggle on video cameras connected to desktops or embedded into smart phones. These programs don’t just spy—criminals can use them for industrial espionage.

All publications in this category: 27

Kids’ web 2.0

Kids’ web 2.0

Children constitute a special group of users that faces the greatest danger due to a lack of experience, credulity, curiosity and other age-related qualities. Therefore, the ways of protecting children are special too.

All publications in this category: 8

Banking online

Banking online

Banking Trojans are one of today’s most dangerous and costly threats; they can deplete bank accounts in seconds. What risks are involved with making online payments, and how can one conduct secure transactions on the Internet?

All publications in this category: 7

Secure storage

Secure storage

In our hi-tech age, one rarely hears about mask-wearing thieves using crowbars to break into safes in the middle of the night to steal important documents. However, valuable corporate data is leaked regularly, and these leaks involve much more sophisticated technology. Why does this happen, and how can it be avoided?

All publications in this category: 6

In the crosshairs

In the crosshairs

A planned, targeted attack on a particular organisation or network is the ultimate when it comes to criminal operations. Targeted APT attacks involve special software, and if you are familiar with it, you are less likely to become a victim.

All publications in this category: 1