Just like every other technology, malicious code has grown increasingly sophisticated and complex, forcing defense technologies to evolve, too. Literature for antivirus software and security systems is laden with technical terminology, but how do different defense technologies stack up against each other? Use our simplified model to put them all in perspective. Get a handle on both the ambiguities as well as the pros and cons of each technology.
A study of malicious programs conducted by Kaspersky Lab virus analysts shows that four types of virtual property are most often stolen. We'll take a look at why such data is stolen and what happens to it once it has been stolen.