Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Kaspersky Adds 'Triple Threat' Protection

Kaspersky Lab introduces Anti-Virus 7.0 and Internet Security 7.0

WOBURN, Mass. -- Kaspersky Lab, a leading developer of Internet threat management solutions that protect against viruses, spyware, hackers and spam, today introduced the newest versions of its flagship consumer and small office products – Kaspersky® Anti-Virus 7.0 and Kaspersky® Internet Security 7.0.

Version 7.0 builds on the foundation of Kaspersky’s award-winning version 6.0 antivirus engine, which earned the worldwide recognition of both advanced IT users and millions of consumers. Kaspersky Anti-Virus 7.0 includes premium-level protection against viruses, Trojans, worms, spyware, adware, rootkits and keyloggers. Kaspersky Internet Security 7.0 offers all this and additional protection against phishing and spam, the integration of a sophisticated firewall, plus privacy and parental controls.

Triple Threat Protection – Kaspersky Anti-Virus 7.0 (KAV) and Kaspersky Internet Security 7.0 (KIS) both offer the same comprehensive three-point protection concept developed by Kaspersky Lab against known and unknown threats. Triple Threat Protection combines three advanced approaches for defending against today’s Internet threats and to effectively combat programs designed to steal financial and confidential data stored on a computer.

Randy Drawas, Vice President, Marketing, Kaspersky Lab: “The number of daily new malicious threats detected in our Lab is growing at an unprecedented rate. And as people continue to store more valuable information on their computer – photos, music or personal information – and as they shop and bank more online, they require automated and robust security they can trust. Our new seventh-generation security solutions just re-upped on our promise to keep our customers safe. Triple Threat Protection seriously raises the bar that cybercriminals have to scale, all while minimally impacting our users’ computing experience.”

Kaspersky Lab

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.